Computer Systems & Telematics Embedded Sensor Boards

Network Security

Edith Ngai, Börje Ohlman, Gene Tsudik, Ersin Uzun, Matthias Wählisch, Christopher A. Wood,
Can We Make a Cake and Eat It Too? A Discussion of ICN Security and Privacy,
ACM Computer Communication Review, Vol. 47, No. 1, pp. 49--54, January 2017.
[BibTeX][Details]

Matthias Wählisch,
Measuring and Implementing Internet Backbone Security: Current Challenges Upcoming Deployment and Future Trends,
Doctoral Dissertation, February 2016.
[pdf][BibTeX][abstract]

Johann Schlamp, Matthias Wählisch, Thomas C. Schmidt, Georg Carle, Ernst W. Biersack,
CAIR: Using Formal Languages to Study Routing Leaking and Interception in BGP,
Technical Report, No. arXiv:1605.00618, May 2016.
[html][BibTeX][Details]

Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth,
Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection,
Technical Report, No. arXiv:1605.05856, May 2016.
[html][BibTeX][Details]

Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder,
A Survey on Honeypot Software and Data Analysis,
Technical Report, No. arXiv:1608.06249, August 2016.
[html][BibTeX][Details]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
TRAIL: Topology Authentication in RPL,
In: Proc. of ACM International Conference on Embedded Wireless Systems and Networks (EWSN), pp. 59--64, New York, NY, USA:ACM, 2016.
[pdf][BibTeX][abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Let's Collect Names: How PANINI Limits FIB Tables in Name Based Routing,
In: Proc. of IFIP Networking, pp. 458--466, Piscataway, NJ, USA:IEEE Press, 2016.
[pdf][BibTeX][Details]

Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth,
Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection,
In: Proc. of ACM Internet Measurement Conference (IMC), pp. 421--427, New York:ACM, 2016.
[BibTeX][Details]

Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, Thomas C. Schmidt,
Amplification and DRDoS Attack Defense -- A Survey and New Perspectives,
Technical Report, No. arXiv:1505.07892, June 2015.
[html][BibTeX][Details]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
In: Proc. of 7th International Workshop on Traffic Monitoring and Analysis (TMA), (Moritz Steiner, Pere Barlet-Ros, Olivier Bonaventure: Ed.), ser. LNCS, Vol. 9053, pp. 188--201, Heidelberg:Springer-Verlag, 2015.
[pdf][BibTeX][abstract]

Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch,
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC,
In: Proc. of ACM SIGCOMM, Poster Session, pp. 603--604, New York:ACM, August 2015.
[pdf][BibTeX][Details]

Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt,
RPKI MIRO: Monitoring and Inspection of RPKI Objects,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 107--108, New York:ACM, August 2015.
[pdf][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt,
See How ISPs Care: An RPKI Validation Extension for Web Browsers,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 115--116, New York:ACM, August 2015.
[pdf][BibTeX][Details]

Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch,
Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics,
In: Proc. of 9th USENIX Security Workshop on Offensive Technologies (WOOT), Berkeley, CA, USA:USENIX Assoc., 2015.
[pdf][BibTeX][abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Partial Adaptive Name Information in ICN: PANINI Routing Limits FIB Table Sizes,
In: Proc. of 2nd ACM Conference on Information-Centric Networking (ICN). Poster Session, pp. 193--194, New York:ACM, 2015.
[pdf][BibTeX][abstract]

Samir Al-Sheikh, Matthias Wählisch, Thomas C. Schmidt,
Revisiting Countermeasures Against NDN Interest Flooding,
In: Proc. of 2nd ACM Conference on Information-Centric Networking (ICN). Poster Session, pp. 195--196, New York:ACM, 2015.
[pdf][BibTeX][abstract]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig, Gareth Tyson,
RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem,
In: Proc. of Fourteenth ACM Workshop on Hot Topics in Networks (HotNets), New York:ACM, 2015.
[pdf][BibTeX][abstract]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig,
When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites,
Technical Report, No. arXiv:1408.0391, August 2014.
[html][BibTeX][Details]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
Technical Report, No. arXiv:1412.5052, December 2014.
[html][BibTeX][Details]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Waehlisch,
Resource Public Key Infrastructure (RPKI) Router Implementation Report,
RFC, No. 7128, February 2014.
[html][BibTeX][abstract]

Emmanuel Baccelli, Oliver Hahm, Matthias Wählisch,
Spontaneous Wireless Networking to Counter Pervasive Monitoring,
In: Proc. of W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT), 2014.
[html][BibTeX][Details]

Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch,
Native Actors: How to Scale Network Forensics,
In: Proc. of ACM SIGCOMM. Demo session, pp. 141--142, New York:ACM, 2014.
[pdf][BibTeX][Details]

Matthias Wählisch, Andr{'e} Vorbach, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen H. Schiller,
Design Implementation and Operation of a Mobile Honeypot,
Technical Report, No. arXiv:1301.7257, Jan 2013.
[html][BibTeX][abstract]

Matthias Wählisch,
Conference Reports. Sec '13: 22nd USENIX Security Symposium. Large Scale Systems Security III,
;login:, Vol. 38, No. 6, pp. 29--31, Dec. 2013.
[BibTeX][Details]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
Topology Authentication in RPL,
Technical Report, No. arXiv:1312.0984, December 2013.
[html][BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Dominik Charousset, Sebastian Meiling,
On Name-based Group Communication: Challenges Concepts and Transparent Deployment,
Computer Communications, Vol. 36, No. 15--16, pp. 1657--1664, Sep.-Oct. 2013.
[pdf][BibTeX][abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Backscatter from the Data Plane -- Threats to Stability and Security in Information-Centric Network Infrastructure,
Computer Networks, Vol. 57, No. 16, pp. 3192--3206, Nov. 2013.
[pdf][BibTeX][abstract]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Waehlisch,
RPKI Router Implementation Report,
IETF Internet Draft -- work in progress, No. 05, December 2013.
[html][BibTeX][abstract]

Martin Landsmann, Heiner Perrey, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
Topology Authentication in RPL,
In: Proc. of the 32nd IEEE INFOCOM. Poster Session, pp. 2447--2448, Piscataway, NJ, USA:IEEE Press, 2013.
[BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Lessons from the Past: Why Data-driven States Harm Future Information-Centric Networking,
In: Proc. of IFIP Networking, Piscataway, NJ, USA:IEEE Press, 2013.
[pdf][BibTeX][Details]

Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller,
RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation,
In: Proc. of 7th USENIX Security Workshop on Cyber Security Experimentation and Test (CSET), Berkeley, CA, USA:USENIX Assoc., 2013.
[pdf][BibTeX][Details]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Waehlisch,
RPKI Router Implementation Report,
IETF Internet Draft -- work in progress, No. 01, January 2012.
[html][BibTeX][abstract]

Emmanuel Baccelli, Lars Gerhold, Christophe Guettier, Ulrich Meissen, Jochen Schiller, Thomas C. Schmidt, Genevieve Sella, Agnes Voisard, Matthias Wählisch, Georg Wittenburg,
SAFEST: A Framework for Early Security Triggers in Public Spaces,
In: Proc. of WISG 2012 -- Workshop Interdisciplinaire sur la Securite Globale, January 2012.
[html][BibTeX][Details]

Matthias Wählisch, Olaf Maennel, Thomas C. Schmidt,
Towards Detecting BGP Route Hijacking using the RPKI,
In: Proc. of ACM SIGCOMM. Poster, pp. 103--104, New York:ACM, August 2012.
[pdf][BibTeX][abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Bulk of Interest: Performance Measurement of Content-Centric Routing,
In: Proc. of ACM SIGCOMM. Poster, pp. 99--100, New York:ACM, August 2012.
[pdf][BibTeX][abstract]

Matthias Wählisch, Sebastian Trapp, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen Schiller,
First Insights from a Mobile Honeypot,
In: Proc. of ACM SIGCOMM. Poster, pp. 305--306, New York:ACM, August 2012.
[pdf][BibTeX][abstract]

Matthias Wählisch, Sebastian Trapp, Jochen Schiller, Benjamin Jochheim, Theodor Nolte, Thomas C. Schmidt, Osman Ugus, Dirk Westhoff, Martin Kutscher, Matthias Küster, Christian Keil, Jochen Schönfelder,
Vitamin C for your Smartphone: The SKIMS Approach for Cooperative and Lightweight Security at Mobiles,
In: Proc. of ACM SIGCOMM. Demo, pp. 271--272, New York:ACM, August 2012.
[pdf][BibTeX][Details]

Matthias Wählisch,
Beta Version of the RPKI RTR Client C Library Released,
Community note, Sep. 2011.
[html][BibTeX][Details]

Matthias Wählisch,
One Day in the Life of RPKI,
Community note, Dec. 2011.
[html][BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Benjamin Jochheim, Michael Gröning,
WiSec 2011 Poster: Context-adaptive Entropy Analysis as a Lightweight Detector of Zero-day Shellcode Intrusion for Mobiles,
ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 15, No. 3, pp. 47--48, New York:ACM, July 2011.
[BibTeX][Details]

Alexander Knauf, Gabriel Hege, Thomas C. Schmidt, Matthias Waehlisch,
A Usage for Shared Resources in RELOAD (ShaRe),
IETF Internet Draft -- work in progress, No. 00, March 2011.
[html][BibTeX][Details]

Sebastian Trapp, Matthias Wählisch, Jochen Schiller,
Short Paper: Can Your Phone Trust Your Friend Selection?,
In: Proc. of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), pp. 69--74, New York:ACM, 2011.
[pdf][BibTeX][abstract]

Matthias Wählisch, Thomas C. Schmidt, Gabriel Hege,
Overlay AuthoCast: Distributed Sender Authentication in Overlay Multicast,
In: Proceedings of the 28th IEEE INFOCOM. Student Workshop, Piscataway, NJ, USA:IEEE Press, April 2009.
[pdf][BibTeX][Details]

Hans L. Cycon, Gabriel Hege, Detlev Marpe, Mark Palkow, Thomas C. Schmidt, Matthias Wählisch,
Connecting the Worlds: Multipoint Videoconferencing Integrating H.323 and IPv4 SIP and IPv6 with Autonomous Sender Authentication,
In: 13th IEEE International Symposium on Consumer Electronics (ISCE'09), pp. 890--893, Piscataway, NJ, USA:IEEE Press, May 2009.
[BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ, Gabriel Hege,
AuthoCast --- a mobility-compliant protocol framework for multicast sender authentication,
Security and Communication Networks, Vol. 1, No. 6, pp. 495--509, John Wiley and Sons, December 2008.
[pdf][BibTeX][abstract]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ,
AuthoCast -- A Protocol for Mobile Multicast Sender Authentication,
In: Proceedings of the 6th International Conference on Advances in Mobile Computing \& Multimedia (MoMM 2008), (Gabriele Kotsis, David Taniar, Eric Pardede, Ismail Khalil Ed.), pp. 142--149, New York:ACM, November 2008.
[BibTeX][Details]

 


This page generated by bibTOhtml on Mi 1. Mär 23:44:06 CET 2017