Name
Papers
Collaborators
HAYA SHULMAN
68
48
Citations 
PageRank 
Referers 
293
37.26
303
Referees 
References 
873
656
Search Limit
100873
Title
Citations
PageRank
Year
Poster: DNS in Routers Considered Harmful00.342022
Poster: RPKI Kill Switch00.342022
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC00.342022
Behind the Scenes of RPKI00.342022
Poster: Insights into Global Deployment of RPKI Validation00.342022
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS00.342021
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I.00.342021
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources00.342021
SMap - Internet-wide Scanning for Spoofing.00.342021
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II.00.342021
The Impact of DNS Insecurity on Time60.562020
Diving into Email Bomb Attack00.342020
Limiting the Power of RPKI Authorities00.342020
Secure Consensus Generation with Distributed DoH30.432020
Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP00.342020
MPC for Securing Internet Infrastructure00.342020
Black-box caches fingerprinting00.342020
Performance penalties of resilient SDN infrastructures00.342020
DISCO: Sidestepping RPKI's Deployment Barriers30.452020
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.00.342019
Optimal Transport Layer For Secure Computation10.432019
Internet As a Source of Randomness.00.342018
Removing the Bottleneck for Practical 2PC00.342018
Off-Path Attacks Against PKI10.402018
Domain Validation++ For MitM-Resilient PKI.171.022018
Path MTU Discovery Considered Harmful20.412018
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.10.352018
Practical Experience: Methodologies for Measuring Route Origin Validation50.572018
Are We There Yet? On RPKI's Deployment and Security.80.662017
One Key To Sign Them All Considered Vulnerable: Evaluation Of Dnssec In The Internet30.432017
Towards Enhancing The Visual Analysis Of Interdomain Routing20.392017
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet40.512017
Authentication-Bypass Vulnerabilities in SOHO Routers00.342017
NetCo: Reliable Routing With Unreliable Routers30.432016
Stratum Filtering: Cloud-based Detection of Attack Sources.00.342016
Towards Automated Measurements of Internet's Naming Infrastructure00.342016
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.00.342016
Detection and Forensics of Domains Hijacking.10.352015
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?30.632015
Towards Security of Internet Naming Infrastructure.110.762015
DNS authentication as a service: preventing amplification attacks.90.542014
Ethical considerations when employing fake identities in online social networks for research.50.702014
Negotiating DNSSEC Algorithms over Legacy Proxies30.462014
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.150.812014
Retrofitting Security into Network Protocols: The Case of DNSSEC150.962014
Less is more: cipher-suite negotiation for DNSSEC.10.392014
Towards Forensic Analysis of Attacks with DNSSEC50.602014
Off-Path Hacking: The Illusion of Challenge-Response Authentication90.822014
POSTER: On the Resilience of DNS Infrastructure30.422014
Vulnerable Delegation of DNS Resolution.241.672013
  • 1
  • 2