default search action
Michael Waidner
Person information
- affiliation: National Research Center for Applied Cybersecurity ATHENE, germany
- affiliation: Technische Universität Darmstadt, Germany
- affiliation: Fraunhofer-Institut für sichere Informationstechnologie SIT, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j41]Haya Schulmann, Michael Waidner:
Wie Deutschland zur Cybernation wird. Datenschutz und Datensicherheit (dud) 48(1): 11-15 (2024) - [j40]Michael Kreutzer, Leonie Wolf, Michael Waidner:
Kryptoagilität. Datenschutz und Datensicherheit (dud) 48(10): 667-672 (2024) - [c118]Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner:
Protocol Fixes for KeyTrap Vulnerabilities. ANRW 2024 - [c117]Nethanel Gelernter, Haya Schulmann, Michael Waidner:
External Attack-Surface of Modern Organizations. AsiaCCS 2024 - [c116]Jens Frieß, Haya Schulmann, Michael Waidner:
Crowdsourced Distributed Domain Validation. HotNets 2024: 318-325 - [c115]Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner:
The CURE to Vulnerabilities in RPKI Validation. NDSS 2024 - [c114]Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner:
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. NSDI 2024 - [c113]Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. WOOT @ USENIX Security Symposium 2024: 45-57 - [i26]Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Attacking with Something That Does Not Exist: Low-Rate Flood with 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. CoRR abs/2403.15233 (2024) - [i25]Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner:
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. CoRR abs/2403.19368 (2024) - [i24]Jens Friess, Donika Mirdita, Haya Schulmann, Michael Waidner:
Byzantine-Secure Relying Party for Resilient RPKI. CoRR abs/2405.00531 (2024) - [i23]Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner:
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC. CoRR abs/2406.03133 (2024) - [i22]Donika Mirdita, Haya Schulmann, Michael Waidner:
SoK: An Introspective Analysis of RPKI Security. CoRR abs/2408.12359 (2024) - [i21]Haya Schulmann, Niklas Vogel, Michael Waidner:
RPKI: Not Perfect But Good Enough. CoRR abs/2409.14518 (2024) - 2023
- [j39]Haya Schulmann, Michael Waidner:
Aktive Cyberabwehr. Datenschutz und Datensicherheit 47(8): 497-502 (2023) - [j38]Jens Friess, Haya Schulmann, Michael Waidner:
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates. PACMNET 1(CoNEXT3): 26:1-26:20 (2023) - [c112]Fabian Kaiser, Haya Schulmann, Michael Waidner:
Poster: Longitudinal Analysis of DoS Attacks. CCS 2023: 3573-3575 - [c111]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Beyond Limits: How to Disable Validators in Secure Networks. SIGCOMM 2023: 950-966 - [c110]Elias Heftrig, Haya Schulmann, Michael Waidner:
Poster: Off-Path DNSSEC Downgrade Attacks. SIGCOMM 2023: 1120-1122 - [c109]Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner:
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. USENIX Security Symposium 2023: 4841-4858 - [c108]Elias Heftrig, Haya Schulmann, Michael Waidner:
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones. USENIX Security Symposium 2023: 7429-7444 - [i20]Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner:
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. CoRR abs/2303.11772 (2023) - [i19]Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner:
The CURE To Vulnerabilities in RPKI Validation. CoRR abs/2312.01872 (2023) - 2022
- [j37]Elisa Bertino, Haya Schulmann, Michael Waidner:
Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022) - [c107]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Behind the Scenes of RPKI. CCS 2022: 1413-1426 - [c106]Elias Heftrig, Haya Schulmann, Michael Waidner:
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. CCS 2022: 3363-3365 - [c105]Donika Mirdita, Haya Schulmann, Michael Waidner:
Poster: RPKI Kill Switch. CCS 2022: 3423-3425 - [c104]Haya Schulmann, Niklas Vogel, Michael Waidner:
Poster: Insights into Global Deployment of RPKI Validation. CCS 2022: 3467-3469 - [c103]Haya Schulmann, Michael Waidner:
Poster: DNS in Routers Considered Harmful. CCS 2022: 3471-3473 - [c102]Tomas Hlavacek, Haya Schulmann, Michael Waidner:
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks. ESORICS (1) 2022: 509-530 - [c101]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Stalloris: RPKI Downgrade Attack. USENIX Security Symposium 2022: 4455-4471 - [c100]Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner:
XDRI Attacks - and - How to Enhance Resilience of Residential Routers. USENIX Security Symposium 2022: 4473-4490 - [i18]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. CoRR abs/2205.05473 (2022) - [i17]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Stalloris: RPKI Downgrade Attack. CoRR abs/2205.06064 (2022) - [i16]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
From IP to transport and beyond: cross-layer attacks against applications. CoRR abs/2205.06085 (2022) - [i15]Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner:
XDRI Attacks - and - How to Enhance Resilience of Residential Routers. CoRR abs/2208.12003 (2022) - 2021
- [c99]Tianxiang Dai, Haya Schulmann, Michael Waidner:
DNS-over-TCP considered vulnerable. ANRW 2021: 76-81 - [c98]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Let's Downgrade Let's Encrypt. CCS 2021: 1421-1440 - [c97]Elias Heftrig, Jean-Pierre Seifert, Haya Schulmann, Michael Waidner, Nils Wisiol:
Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. CCS 2021: 2423-2425 - [c96]Markus Brandt, Haya Schulmann, Michael Waidner:
Evaluating Resilience of Domains in PKI. CCS 2021: 2444-2446 - [c95]Lukas Baumann, Elias Heftrig, Haya Schulmann, Michael Waidner:
The Master and Parasite Attack. DSN 2021: 141-148 - [c94]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Poster: Off-path VoIP Interception Attacks. ICDCS 2021: 1-2 - [c93]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Poster: Fragmentation Attacks on DNS over TCP. ICDCS 2021: 1124-1125 - [c92]Tomas Hlavacek, Haya Schulmann, Michael Waidner:
Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments. INFOCOM Workshops 2021: 1-2 - [c91]Haya Schulmann, Michael Waidner:
SSLChecker. INFOCOM Workshops 2021: 1-2 - [c90]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
From IP to transport and beyond: cross-layer attacks against applications. SIGCOMM 2021: 836-849 - [c89]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. USENIX Security Symposium 2021: 3147-3164 - [e7]Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents] - [e6]Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents] - [i14]Lukas Baumann, Elias Heftrig, Haya Schulmann, Michael Waidner:
The Master and Parasite Attack. CoRR abs/2107.06415 (2021) - 2020
- [c88]Daniel Senf, Haya Schulmann, Michael Waidner:
Performance penalties of resilient SDN infrastructures. CoNEXT 2020: 528-529 - [c87]Amit Klein, Elias Heftrig, Haya Schulmann, Michael Waidner:
Black-box caches fingerprinting. CoNEXT 2020: 564-565 - [c86]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Secure Consensus Generation with Distributed DoH. DSN (Supplements) 2020: 41-42 - [c85]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP. DSN (Supplements) 2020: 49-50 - [c84]Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Impact of DNS Insecurity on Time. DSN 2020: 266-277 - [c83]Markus Schneider, Haya Schulmann, Adi Sidis, Ravid Sidis, Michael Waidner:
Diving into Email Bomb Attack. DSN 2020: 286-293 - [c82]Amit Klein, Haya Schulmann, Michael Waidner:
Cryptanalysis of FNV-Based Cookies. GLOBECOM 2020: 1-6 - [c81]Markus Schneider, Haya Schulmann, Michael Waidner:
Blocking Email Bombs with EmailGlass. GLOBECOM 2020: 1-6 - [i13]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Pitfalls of Provably Secure Systems in Internet The Case of Chronos-NTP. CoRR abs/2010.08460 (2020) - [i12]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Secure Consensus Generation with Distributed DoH. CoRR abs/2010.09331 (2020) - [i11]Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Impact of DNS Insecurity on Time. CoRR abs/2010.09338 (2020)
2010 – 2019
- 2019
- [c80]Markus Brandt, Haya Schulmann, Michael Waidner:
Internet As a Source of Randomness. Krypto-Tag 2019 - [c79]Markus Brandt, Haya Schulmann, Michael Waidner:
Distributed Domain Validation (DDV). Krypto-Tag 2019 - 2018
- [c78]Markus Brandt, Tianxiang Dai, Amit Klein, Haya Schulmann, Michael Waidner:
Domain Validation++ For MitM-Resilient PKI. CCS 2018: 2060-2076 - [c77]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Off-Path Attacks Against PKI. CCS 2018: 2213-2215 - [c76]Kris Shrishak, Haya Schulmann, Michael Waidner:
Removing the Bottleneck for Practical 2PC. CCS 2018: 2300-2302 - [c75]Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner:
Practical Experience: Methodologies for Measuring Route Origin Validation. DSN 2018: 634-641 - [c74]Markus Brandt, Haya Schulmann, Michael Waidner:
Internet As a Source of Randomness. HotNets 2018: 64-70 - [c73]Matthias Gohring, Haya Schulmann, Michael Waidner:
Path MTU Discovery Considered Harmful. ICDCS 2018: 866-874 - 2017
- [c72]Amit Klein, Vladimir Kravtsov, Alon Perlmuter, Haya Schulmann, Michael Waidner:
POSTER: X-Ray Your DNS. CCS 2017: 2519-2521 - [c71]Amit Klein, Haya Schulmann, Michael Waidner:
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. DSN 2017: 367-378 - [c70]Amit Klein, Haya Schulmann, Michael Waidner:
Internet-wide study of DNS cache injections. INFOCOM 2017: 1-9 - [c69]Haya Schulmann, Michael Waidner:
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet. NSDI 2017: 131-144 - [c68]Nadav Rotenberg, Haya Schulmann, Michael Waidner, Benjamin Zeltser:
Authentication-Bypass Vulnerabilities in SOHO Routers. SIGCOMM Posters and Demos 2017: 68-70 - 2016
- [j36]Marco Ghiglieri, Michael Waidner:
HbbTV Security and Privacy: Issues and Challenges. IEEE Secur. Priv. 14(3): 61-67 (2016) - [c67]Tianxiang Dai, Haya Schulmann, Michael Waidner:
DNSSEC Misconfigurations in Popular Domains. CANS 2016: 651-660 - [c66]Amir Herzberg, Haya Schulmann, Michael Waidner:
Stratum Filtering: Cloud-based Detection of Attack Sources. CCSW 2016: 47-48 - [c65]Michael Waidner, Michael Kasper:
Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution. DATE 2016: 1303-1308 - [c64]Anja Feldmann, Philipp Heyder, Michael Kreutzer, Stefan Schmid, Jean-Pierre Seifert, Haya Schulmann, Kashyap Thimmaraju, Michael Waidner, Jens Sieberg:
NetCo: Reliable Routing With Unreliable Routers. DSN Workshops 2016: 128-135 - [c63]Andreas Borgwart, Haya Schulmann, Michael Waidner:
Towards Automated Measurements of Internet's Naming Infrastructure. SwSTE 2016: 117-124 - [c62]Haya Schulmann, Michael Waidner:
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure. TMA 2016 - 2015
- [j35]Christoph Krauß, Michael Waidner:
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug. Datenschutz und Datensicherheit 39(6): 383-387 (2015) - [c61]Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner:
Security and privacy challenges in industrial internet of things. DAC 2015: 54:1-54:6 - [c60]Haya Schulmann, Michael Waidner:
Towards Security of Internet Naming Infrastructure. ESORICS (1) 2015: 3-22 - [c59]Andreas Borgwart, Spyros Boukoros, Haya Schulmann, Carel van Rooyen, Michael Waidner:
Detection and Forensics of Domains Hijacking. GLOBECOM 2015: 1-6 - 2014
- [j34]Haya Schulmann, Michael Waidner:
DNSSEC for cyber forensics. EURASIP J. Inf. Secur. 2014: 16 (2014) - [c58]Haya Schulmann, Michael Waidner:
Fragmentation Considered Leaking: Port Inference for DNS Poisoning. ACNS 2014: 531-548 - [c57]Marco Ghiglieri, Martin Stopczynski, Michael Waidner:
Personal DLP for Facebook. PerCom Workshops 2014: 629-634 - [c56]Haya Schulmann, Michael Waidner:
Towards Forensic Analysis of Attacks with DNSSEC. IEEE Symposium on Security and Privacy Workshops 2014: 69-76 - 2012
- [j33]Michael Kreutzer, Michael Waidner, Johannes Buchmann:
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung. Prax. Inf.verarb. Kommun. 35(4): 305-308 (2012) - [e5]Neeraj Suri, Michael Waidner:
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt. LNI P-195, GI 2012, ISBN 978-3-88579-289-5 [contents] - [i10]Rüdiger Kapitza, Matthias Schunter, Marc Shapiro, Paulo Veríssimo, Michael Waidner:
Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281). Dagstuhl Reports 2(7): 56-72 (2012) - 2011
- [j32]Simone Fischer-Hübner, Chris Jay Hoofnagle, Ioannis Krontiris, Kai Rannenberg, Michael Waidner:
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Manifestos 1(1): 1-20 (2011) - [j31]Hannes Federrath, Marit Hansen, Michael Waidner:
Andreas Pfitzmann 1958 - 2010. it Inf. Technol. 53(1): 5-7 (2011) - [i9]Simone Fischer-Hübner, Chris Jay Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris, Michael Marhöfer:
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Reports 1(2): 1-15 (2011) - 2010
- [c55]Hannes Federrath, Marit Hansen, Michael Waidner:
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society. PrimeLife 2010: 349-352
2000 – 2009
- 2007
- [j30]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007) - [j29]Michael Backes, David A. Basin, Michael Waidner:
Preface. J. Comput. Secur. 15(6): 561 (2007) - [c54]Matthias Schunter, Michael Waidner:
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. Privacy Enhancing Technologies 2007: 218-232 - 2006
- [c53]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 - [c52]Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178 - [c51]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423 - [c50]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Formal Methods and Cryptography. FM 2006: 612-616 - [p2]Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Service-oriented Assurance - Comprehensive Security by Explicit Assurances. Quality of Protection 2006: 13-24 - [i8]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Reactively Simulatable Certified Mail. IACR Cryptol. ePrint Arch. 2006: 41 (2006) - [i7]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. IACR Cryptol. ePrint Arch. 2006: 47 (2006) - [i6]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. IACR Cryptol. ePrint Arch. 2006: 68 (2006) - 2005
- [j28]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005) - [j27]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005) - [j26]Vern Paxson, Michael Waidner:
Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. IEEE Trans. Dependable Secur. Comput. 2(2): 81 (2005) - 2004
- [j25]Günter Karjoth, Matthias Schunter, Michael Waidner:
Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004) - [j24]Michael Waidner:
Preface. Int. J. Inf. Sec. 3(1): 1 (2004) - [j23]Marit Hansen, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, Michael Waidner:
Privacy-enhancing identity management. Inf. Secur. Tech. Rep. 9(1): 35-44 (2004) - [j22]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Polynomial liveness. J. Comput. Secur. 12(3-4): 589-617 (2004) - [c49]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41 - [c48]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51 - [c47]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354 - [e4]Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner:
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-971-3 [contents] - [i5]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. IACR Cryptol. ePrint Arch. 2004: 82 (2004) - 2003
- [j21]Birgit Pfitzmann, Michael Waidner:
Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Comput. 7(6): 38-44 (2003) - [c46]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Security in Business Process Engineering. Business Process Management 2003: 168-183 - [c45]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A composable cryptographic library with nested operations. CCS 2003: 220-230 - [c44]Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner:
Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449 - [c43]