Computer Systems & Telematics Embedded Sensor Boards

Network Security

Matthias Flittner, Mohamed Naoufal Mahfoudi, Damien Saucez, Matthias Wählisch, Luigi Iannone, Vaibhav Bajpai, Alex Afanasyev,
A Survey on Artifacts from CoNEXT ICN IMC and SIGCOMM Conferences in 2017,
ACM SIGCOMM Computer Communication Review, Vol. 48, No. 1, pp. 75--80, January 2018.
[html][pdf][BibTeX][Details]

Andreas Reuter, Randy Bush, Italo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt, Matthias Wählisch,
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering,
ACM SIGCOMM Computer Communication Review, Vol. 48, No. 1, pp. 19--27, January 2018.
[html][pdf][BibTeX][abstract]

Nico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch,
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP,
In: Proc. of ACM SIGCOMM. Poster Session, pp. 57--59, New York, NY, USA:ACM, August 2018.
[pdf][BibTeX][abstract]

Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch,
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem,
In: Proc. of ACM Internet Measurement Conference (IMC), New York:ACM, 2018.
[pdf][BibTeX][abstract]

Edith Ngai, Börje Ohlman, Gene Tsudik, Ersin Uzun, Matthias Wählisch, Christopher A. Wood,
Can We Make a Cake and Eat It Too? A Discussion of ICN Security and Privacy,
ACM SIGCOMM Computer Communication Review, Vol. 47, No. 1, pp. 49--54, January 2017.
[pdf][BibTeX][Details]

Andreas Reuter, Randy Bush, {\'I}talo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt, Matthias Wählisch,
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering,
Technical Report, No. arXiv:1706.04263, June 2017.
[html][pdf][BibTeX][abstract]

Matthias Wählisch,
Measuring and Implementing Internet Backbone Security: Current Challenges Upcoming Deployment and Future Trends,
Doctoral Dissertation, February 2016.
[pdf][BibTeX][abstract]

Johann Schlamp, Matthias Wählisch, Thomas C. Schmidt, Georg Carle, Ernst W. Biersack,
CAIR: Using Formal Languages to Study Routing Leaking and Interception in BGP,
Technical Report, No. arXiv:1605.00618, May 2016.
[html][BibTeX][Details]

Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth,
Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection,
Technical Report, No. arXiv:1605.05856, May 2016.
[html][BibTeX][Details]

Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder,
A Survey on Honeypot Software and Data Analysis,
Technical Report, No. arXiv:1608.06249, August 2016.
[html][BibTeX][Details]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
TRAIL: Topology Authentication in RPL,
In: Proc. of ACM International Conference on Embedded Wireless Systems and Networks (EWSN), pp. 59--64, New York, NY, USA:ACM, 2016.
[pdf][BibTeX][abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Let's Collect Names: How PANINI Limits FIB Tables in Name Based Routing,
In: Proc. of IFIP Networking, pp. 458--466, Piscataway, NJ, USA:IEEE Press, 2016.
[pdf][BibTeX][Details]

Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth,
Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection,
In: Proc. of ACM Internet Measurement Conference (IMC), pp. 421--427, New York:ACM, 2016.
[pdf][BibTeX][Details]

Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, Thomas C. Schmidt,
Amplification and DRDoS Attack Defense -- A Survey and New Perspectives,
Technical Report, No. arXiv:1505.07892, June 2015.
[html][BibTeX][Details]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
In: Proc. of 7th International Workshop on Traffic Monitoring and Analysis (TMA), (Moritz Steiner, Pere Barlet-Ros, Olivier Bonaventure: Ed.), ser. LNCS, Vol. 9053, pp. 188--201, Heidelberg:Springer-Verlag, 2015.
[pdf][BibTeX][abstract]

Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch,
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC,
In: Proc. of ACM SIGCOMM, Poster Session, pp. 603--604, New York:ACM, August 2015.
[pdf][BibTeX][Details]

Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt,
RPKI MIRO: Monitoring and Inspection of RPKI Objects,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 107--108, New York:ACM, August 2015.
[pdf][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt,
See How ISPs Care: An RPKI Validation Extension for Web Browsers,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 115--116, New York:ACM, August 2015.
[pdf][BibTeX][Details]

Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch,
Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics,
In: Proc. of 9th USENIX Security Workshop on Offensive Technologies (WOOT), Berkeley, CA, USA:USENIX Assoc., 2015.
[pdf][BibTeX][abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Partial Adaptive Name Information in ICN: PANINI Routing Limits FIB Table Sizes,
In: Proc. of 2nd ACM Conference on Information-Centric Networking (ICN). Poster Session, pp. 193--194, New York:ACM, 2015.
[pdf][BibTeX][abstract]

Samir Al-Sheikh, Matthias Wählisch, Thomas C. Schmidt,
Revisiting Countermeasures Against NDN Interest Flooding,
In: Proc. of 2nd ACM Conference on Information-Centric Networking (ICN). Poster Session, pp. 195--196, New York:ACM, 2015.
[pdf][BibTeX][abstract]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig, Gareth Tyson,
RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem,
In: Proc. of Fourteenth ACM Workshop on Hot Topics in Networks (HotNets), New York:ACM, 2015.
[pdf][BibTeX][abstract]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig,
When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites,
Technical Report, No. arXiv:1408.0391, August 2014.
[html][BibTeX][Details]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
Technical Report, No. arXiv:1412.5052, December 2014.
[html][BibTeX][Details]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Waehlisch,
Resource Public Key Infrastructure (RPKI) Router Implementation Report,
RFC, No. 7128, February 2014.
[html][BibTeX][abstract]

Emmanuel Baccelli, Oliver Hahm, Matthias Wählisch,
Spontaneous Wireless Networking to Counter Pervasive Monitoring,
In: Proc. of W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT), 2014.
[html][BibTeX][Details]

Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch,
Native Actors: How to Scale Network Forensics,
In: Proc. of ACM SIGCOMM. Demo session, pp. 141--142, New York:ACM, 2014.
[pdf][BibTeX][Details]

Matthias Wählisch, Andr{'e} Vorbach, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen H. Schiller,
Design Implementation and Operation of a Mobile Honeypot,
Technical Report, No. arXiv:1301.7257, Jan 2013.
[html][BibTeX][abstract]

Matthias Wählisch,
Conference Reports. Sec '13: 22nd USENIX Security Symposium. Large Scale Systems Security III,
;login:, Vol. 38, No. 6, pp. 29--31, Dec. 2013.
[BibTeX][Details]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
Topology Authentication in RPL,
Technical Report, No. arXiv:1312.0984, December 2013.
[html][BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Dominik Charousset, Sebastian Meiling,
On Name-based Group Communication: Challenges Concepts and Transparent Deployment,
Computer Communications, Vol. 36, No. 15--16, pp. 1657--1664, Sep.-Oct. 2013.
[pdf][BibTeX][abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Backscatter from the Data Plane -- Threats to Stability and Security in Information-Centric Network Infrastructure,
Computer Networks, Vol. 57, No. 16, pp. 3192--3206, Nov. 2013.
[pdf][BibTeX][abstract]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Waehlisch,
RPKI Router Implementation Report,
IETF Internet Draft -- work in progress, No. 05, December 2013.
[html][BibTeX][abstract]

Martin Landsmann, Heiner Perrey, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
Topology Authentication in RPL,
In: Proc. of the 32nd IEEE INFOCOM. Poster Session, pp. 2447--2448, Piscataway, NJ, USA:IEEE Press, 2013.
[BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Lessons from the Past: Why Data-driven States Harm Future Information-Centric Networking,
In: Proc. of IFIP Networking, Piscataway, NJ, USA:IEEE Press, 2013.
[pdf][BibTeX][Details]

Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller,
RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation,
In: Proc. of 7th USENIX Security Workshop on Cyber Security Experimentation and Test (CSET), Berkeley, CA, USA:USENIX Assoc., 2013.
[pdf][BibTeX][Details]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Waehlisch,
RPKI Router Implementation Report,
IETF Internet Draft -- work in progress, No. 01, January 2012.
[html][BibTeX][abstract]

Emmanuel Baccelli, Lars Gerhold, Christophe Guettier, Ulrich Meissen, Jochen Schiller, Thomas C. Schmidt, Genevieve Sella, Agnes Voisard, Matthias Wählisch, Georg Wittenburg,
SAFEST: A Framework for Early Security Triggers in Public Spaces,
In: Proc. of WISG 2012 -- Workshop Interdisciplinaire sur la Securite Globale, January 2012.
[html][BibTeX][Details]

Matthias Wählisch, Olaf Maennel, Thomas C. Schmidt,
Towards Detecting BGP Route Hijacking using the RPKI,
In: Proc. of ACM SIGCOMM. Poster, pp. 103--104, New York:ACM, August 2012.
[pdf][BibTeX][abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Bulk of Interest: Performance Measurement of Content-Centric Routing,
In: Proc. of ACM SIGCOMM. Poster, pp. 99--100, New York:ACM, August 2012.
[pdf][BibTeX][abstract]

Matthias Wählisch, Sebastian Trapp, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen Schiller,
First Insights from a Mobile Honeypot,
In: Proc. of ACM SIGCOMM. Poster, pp. 305--306, New York:ACM, August 2012.
[pdf][BibTeX][abstract]

Matthias Wählisch, Sebastian Trapp, Jochen Schiller, Benjamin Jochheim, Theodor Nolte, Thomas C. Schmidt, Osman Ugus, Dirk Westhoff, Martin Kutscher, Matthias Küster, Christian Keil, Jochen Schönfelder,
Vitamin C for your Smartphone: The SKIMS Approach for Cooperative and Lightweight Security at Mobiles,
In: Proc. of ACM SIGCOMM. Demo, pp. 271--272, New York:ACM, August 2012.
[pdf][BibTeX][Details]

Matthias Wählisch,
Beta Version of the RPKI RTR Client C Library Released,
Community note, Sep. 2011.
[html][BibTeX][Details]

Matthias Wählisch,
One Day in the Life of RPKI,
Community note, Dec. 2011.
[html][BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Benjamin Jochheim, Michael Gröning,
WiSec 2011 Poster: Context-adaptive Entropy Analysis as a Lightweight Detector of Zero-day Shellcode Intrusion for Mobiles,
ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 15, No. 3, pp. 47--48, New York:ACM, July 2011.
[BibTeX][Details]

Alexander Knauf, Gabriel Hege, Thomas C. Schmidt, Matthias Waehlisch,
A Usage for Shared Resources in RELOAD (ShaRe),
IETF Internet Draft -- work in progress, No. 00, March 2011.
[html][BibTeX][Details]

Sebastian Trapp, Matthias Wählisch, Jochen Schiller,
Short Paper: Can Your Phone Trust Your Friend Selection?,
In: Proc. of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), pp. 69--74, New York:ACM, 2011.
[pdf][BibTeX][abstract]

Matthias Wählisch, Thomas C. Schmidt, Gabriel Hege,
Overlay AuthoCast: Distributed Sender Authentication in Overlay Multicast,
In: Proceedings of the 28th IEEE INFOCOM. Student Workshop, Piscataway, NJ, USA:IEEE Press, April 2009.
[pdf][BibTeX][Details]

Hans L. Cycon, Gabriel Hege, Detlev Marpe, Mark Palkow, Thomas C. Schmidt, Matthias Wählisch,
Connecting the Worlds: Multipoint Videoconferencing Integrating H.323 and IPv4 SIP and IPv6 with Autonomous Sender Authentication,
In: 13th IEEE International Symposium on Consumer Electronics (ISCE'09), pp. 890--893, Piscataway, NJ, USA:IEEE Press, May 2009.
[BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ, Gabriel Hege,
AuthoCast --- a mobility-compliant protocol framework for multicast sender authentication,
Security and Communication Networks, Vol. 1, No. 6, pp. 495--509, John Wiley and Sons, December 2008.
[pdf][BibTeX][abstract]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ,
AuthoCast -- A Protocol for Mobile Multicast Sender Authentication,
In: Proceedings of the 6th International Conference on Advances in Mobile Computing \& Multimedia (MoMM 2008), (Gabriele Kotsis, David Taniar, Eric Pardede, Ismail Khalil Ed.), pp. 142--149, New York:ACM, November 2008.
[BibTeX][Details]

 


This page generated by bibTOhtml on Di 9. Okt 15:31:34 CEST 2018