Network Security

Martin Landsmann, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch,
Demo: Topological Robustness of RPL with TRAIL,
In: Proc. of ACM Intern. Conf. on Embedded Wireless Systems and Networks (EWSN), New York, NY, USA: ACM, Feb. 2016. accepted for publication
[BibTeX][Abstract]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
TRAIL: Topology Authentication in RPL,
In: Proc. of ACM Intern. Conf. on Embedded Wireless Systems and Networks (EWSN), New York, NY, USA: ACM, 2016. accepted for publication
[PDF][BibTeX][Abstract]

Matthias Wählisch,
Measuring and Implementing Internet Backbone Security: Current Challenges Upcoming Deployment and Future Trends,
Doctoral Dissertation, Department of Mathematics and Computer Science, Freie Universität Berlin, February 2016.
[BibTeX][Abstract]

Johann Schlamp, Matthias Wählisch, Thomas C. Schmidt, Georg Carle, Ernst W. Biersack,
CAIR: Using Formal Languages to Study Routing Leaking and Interception in BGP,
Open Archive: arXiv.org, Technical Report, No. arXiv:1605.00618, May 2016.
[HTML][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt,
See How ISPs Care: An RPKI Validation Extension for Web Browsers,
In: Proc. of ACM SIGCOMM Demo Session, pp. 115--116, New York: ACM, August 2015.
[PDF][BibTeX][Details]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig, Gareth Tyson,
RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem,
In: Proc. of Fourteenth ACM Workshop on Hot Topics in Networks (HotNets), New York: ACM, 2015. Accepted for publication
[PDF][BibTeX][Abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Partial Adaptive Name Information in ICN: PANINI Routing Limits FIB Table Sizes,
In: Proc. of 2nd ACM Conference on Information-Centric Networking (ICN). Poster Session, New York: ACM, 2015. Accepted for publication
[PDF][BibTeX][Abstract]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
In: 7th International Workshop on Traffic Monitoring and Analysis (TMA), (Moritz Steiner, Pere Barlet-Ros, Olivier Bonaventure: Ed.), ser. LNCS, Vol. 9053, pp. 188--201, Heidelberg: Springer-Verlag, 2015.
[PDF][BibTeX][Abstract]

Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt,
RPKI MIRO: Monitoring and Inspection of RPKI Objects,
In: Proc. of ACM SIGCOMM Demo Session, pp. 107--108, New York: ACM, August 2015.
[PDF][BibTeX][Details]

Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch,
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC,
In: Proc. of ACM SIGCOMM Poster Session, pp. 603--604, New York: ACM, August 2015.
[PDF][BibTeX][Details]

Samir Al-Sheikh, Matthias Wählisch, Thomas C. Schmidt,
Revisiting Countermeasures Against NDN Interest Flooding,
In: Proc. of 2nd ACM Conference on Information-Centric Networking (ICN). Poster Session, New York: ACM, 2015. Accepted for publication
[PDF][BibTeX][Abstract]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig,
When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites,
Open Archive: arXiv.org, Technical Report, No. arXiv:1408.0391, August 2014.
[HTML][BibTeX][Details]

Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch,
Native Actors: How to Scale Network Forensics,
In: Proc. of ACM SIGCOMM. Demo session, pp. 141--142, New York: ACM, 2014.
[PDF][BibTeX][Details]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
Open Archive: arXiv.org, Technical Report, No. arXiv:1412.5052, December 2014.
[HTML][BibTeX][Details]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Wählisch,
Resource Public Key Infrastructure (RPKI) Router Implementation Report,
RFC Editor, IETF, RFC, No. 7128, February 2014.
[HTML][BibTeX][Abstract]

Emmanuel Baccelli, Oliver Hahm, Matthias Wählisch,
Spontaneous Wireless Networking to Counter Pervasive Monitoring,
In: Proc. of W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT), 2014.
[HTML][BibTeX][Details]

Matthias Wählisch, Andr{'e} Vorbach, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen H. Schiller,
Design Implementation and Operation of a Mobile Honeypot,
Open Archive: arXiv.org, Technical Report, No. arXiv:1301.7257, Jan 2013.
[HTML][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Lessons from the Past: Why Data-driven States Harm Future Information-Centric Networking,
In: Proc. of IFIP Networking, Piscataway, NJ, USA: IEEE Press, 2013.
[PDF][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Backscatter from the Data Plane -- Threats to Stability and Security in Information-Centric Network Infrastructure,
Computer Networks, Vol. 57, No. 16, pp. 3192--3206, Nov. 2013.
[PDF][BibTeX][Abstract]

Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen Schiller,
RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation,
In: Proc. of USENIX Security Workshop CSET'13, Berkeley, CA, USA: USENIX Assoc., 2013.
[PDF][BibTeX][Details]

Matthias Wählisch,
Conference Reports. Sec '13: 22nd USENIX Security Symposium. Large Scale Systems Security III,
;login:, Vol. 38, No. 6, pp. 29--31, Dec. 2013. Electronic supplement
[BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Dominik Charousset, Sebastian Meiling,
On Name-based Group Communication: Challenges Concepts and Transparent Deployment,
Computer Communications, Vol. 36, No. 15--16, pp. 1657--1664, Sep.-Oct. 2013.
[PDF][BibTeX][Abstract]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
Topology Authentication in RPL,
Open Archive: arXiv.org, Technical Report, No. arXiv:1312.0984, December 2013.
[HTML][BibTeX][Details]

Martin Landsmann, Heiner Perrey, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
Topology Authentication in RPL,
In: Proc. of the 32nd IEEE INFOCOM. Poster Session, pp. 2447--2448, Piscataway, NJ, USA: IEEE Press, 2013.
[BibTeX][Details]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Wählisch,
RPKI Router Implementation Report,
SIDR Working Group, IETF Internet Draft -- work in progress, No. 05, December 2013.
[HTML][BibTeX][Abstract]

Matthias Wählisch, Sebastian Trapp, Jochen Schiller, Benjamin Jochheim, Theodor Nolte, Thomas C. Schmidt, Osman Ugus, Dirk Westhoff, Martin Kutscher, Matthias Küster, Christian Keil, Jochen Schönfelder,
Vitamin C for your Smartphone: The SKIMS Approach for Cooperative and Lightweight Security at Mobiles,
In: Proc. of ACM SIGCOMM. Demo, pp. 271--272, New York: ACM, August 2012.
[PDF][BibTeX][Details]

Matthias Wählisch, Sebastian Trapp, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen Schiller,
First Insights from a Mobile Honeypot,
In: Proc. of ACM SIGCOMM. Poster, pp. 305--306, New York: ACM, August 2012.
[PDF][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Bulk of Interest: Performance Measurement of Content-Centric Routing,
In: Proc. of ACM SIGCOMM. Poster, pp. 99--100, New York: ACM, August 2012.
[PDF][BibTeX][Abstract]

Matthias Wählisch, Olaf Maennel, Thomas C. Schmidt,
Towards Detecting BGP Route Hijacking using the RPKI,
In: Proc. of ACM SIGCOMM. Poster, pp. 103--104, New York: ACM, August 2012.
[PDF][BibTeX][Abstract]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Wählisch,
RPKI Router Implementation Report,
individual, IETF Internet Draft -- work in progress, No. 01, January 2012.
[HTML][BibTeX][Abstract]

Sebastian Trapp, Matthias Wählisch, Jochen Schiller,
Short Paper: Can Your Phone Trust Your Friend Selection?,
In: Proc. of the 1st ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 69--74, New York: ACM, 2011.
[PDF][BibTeX][Abstract]

Thomas C. Schmidt, Gabriel Hege, Matthias Wählisch, Hans L. Cycon, Mark Palkow, Detlev Marpe,
Distributed SIP Conference Management with Autonomously Authenticated Sources and its Application to an H.264 Videoconferencing Software for Mobiles,
Multimedia Tools and Applications, Vol. 53, No. 2, pp. 349--370, Berlin, Heidelberg: Springer Verlag, June 2011.
[HTML][PDF][BibTeX][Abstract]

Alexander Knauf, Gabriel Hege, Thomas C. Schmidt, Matthias Wählisch,
A Usage for Shared Resources in RELOAD (ShaRe),
individual, IETF Internet Draft -- work in progress, No. 00, March 2011.
[HTML][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Gabriel Hege,
Overlay AuthoCast: Distributed Sender Authentication in Overlay Multicast,
In: Proceedings of the 28th IEEE INFOCOM. Student Workshop, Piscataway, NJ, USA: IEEE Press, April 2009. Extended abstract
[PDF][BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ, Gabriel Hege,
AuthoCast --- a mobility-compliant protocol framework for multicast sender authentication,
Security and Communication Networks, Vol. 1, No. 6, pp. 495--509, John Wiley and Sons, December 2008. Special issue Secure Multimedia Communication
[PDF][BibTeX][Abstract]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ,
AuthoCast -- A Protocol for Mobile Multicast Sender Authentication,
In: Proceedings of the 6th International Conference on Advances in Mobile Computing \& Multimedia (MoMM 2008), (Gabriele Kotsis, David Taniar, Eric Pardede, Ismail Khalil Ed.), pp. 142--149, New York: ACM, November 2008.
[BibTeX][Details]

Georg Wittenburg,
A Defense Against Replay Attacks on Chaumian Mixes,
2003.
[PDF][BibTeX][Abstract]

 


This page generated by bibTOhtml on Di 19. Sep 01:00:02 CEST 2017