Network Security

Pouyan Fotouhi Tehrani, Eric Osterweil, Thomas C. Schmidt, Matthias Wählisch,
How to Measure TLS, X.509 Certificates, and Web PKI: A Tutorial and Brief Survey,
Technical Report, No. 2401.18053, Open Archive: arXiv.org, January 2024.
[pdf][BibTeX][Abstract]

Pouyan Fotouhi Tehrani, Eric Osterweil, Thomas C. Schmidt, Matthias Wählisch,
A Security Model for Web-Based Communication,
Communication of the ACM, ACM : New York, USA, 2024. (in press)
[html][BibTeX][Abstract]

Timo Häckel, Philipp Meyer, Franz Korf, Thomas C. Schmidt,
Secure Time-Sensitive Software-Defined Networking in Vehicles,
IEEE Transactions on Vehicular Technology, Vol. 72, No. 1, pp. 35 - 51, IEEE Press : Piscataway, NJ, USA, January 2023.
[html][pdf][BibTeX][Abstract]

Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch,
PUF for the Commons: Enhancing Embedded Security on the OS Level,
IEEE Transactions on Dependable and Secure Computing, IEEE Press : Piscataway, NJ, USA, 2023. (in press)
[html][pdf][BibTeX][Abstract]

Mehmet Mueller, Timo Häckel, Philipp Meyer, Franz Korf, Thomas C. Schmidt,
Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE,
In: Proc. of the 14th IEEE Vehicular Networking Conference (VNC), p. 231–238, IEEE, April 2023.
[html][pdf][BibTeX][Abstract]

Timo Häckel, Philipp Meyer, Mehmet Mueller, Jan Schmitt-Solbrig, Franz Korf, Thomas C. Schmidt,
Dynamic Service-Orientation for Software-Defined In-Vehicle Networks,
In: Proc. of the IEEE 97th Vehicular Technology Conference (VTC2023-Spring), p. 1–5, IEEE, June 2023.
[html][pdf][BibTeX][Abstract]

Marcin Nawrocki, John Kristoff, Chris Kanich, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch,
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots,
In: Proc. of IEEE Euro Security & Privacy, p. 576–591, IEEE, July 2023.
[html][pdf][BibTeX][Abstract]

Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch,
Securing Name Resolution in the IoT: DNS over CoAP,
Proceedings of the ACM on Networking (PACMNET), Vol. 1, No. CoNEXT2, p. 6:1–6:25, ACM : New York, NY, USA, September 2023.
[html][pdf][BibTeX][Abstract]

Nils Rodday, \'Italo Cunha, Randy Bush, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt, Matthias Wählisch,
The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects,
IEEE Transactions on Network and Service Management (TNSM), IEEE Press : Piscataway, NJ, USA, 2023. (in press)
[html][BibTeX][Abstract]

Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch,
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT,
ACM Comput. Surv., Vol. 54, No. 6, p. 112:1–112:38, ACM : New York, NY, USA, July 2022.
[html][pdf][BibTeX][Abstract]

Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Thomas C. Schmidt, Matthias Wählisch,
DNS over CoAP (DoC),
IETF Internet Draft – work in progress, No. 01, October 2022.
[html][BibTeX][Abstract]

Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch,
Industrial control protocols in the Internet core: Dismantling operational practices,
International Journal of Network Management, Vol. 32, No. 1, p. e2158, 2022.
[html][BibTeX][Abstract]

Cenk Gündogan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch,
Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions,
IEEE Transactions on Network and Service Management (TNSM), Vol. 19, No. 1, p. 538–553, IEEE : Piscataway, NJ, USA, March 2022.
[html][pdf][BibTeX][Abstract]

Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch,
Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope,
In: Proc. of 31st USENIX Security Symposium, pp. 431-448, USENIX Association : Berkeley, CA, USA, August 2022.
[html][pdf][BibTeX][Abstract]

Leandro Lanzieri, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch,
Secure and Authorized Client-to-Client Communication for LwM2M,
In: Proc. of ACM/IEEE Int. Conf. on Information Processing in Sensor Networks (IPSN '22), p. 158–170, IEEE : Piscataway, NJ, USA, May 2022.
[html][pdf][BibTeX][Abstract]

Lena Boeckmann, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch,
Poster Abstract: Offloading Crypto Processing with RIOT,
In: Proc. of ACM/IEEE Int. Conf. on Information Processing in Sensor Networks (IPSN '22), Poster Session, p. 535–536, IEEE : Piscataway, NJ, USA, May 2022.
[html][BibTeX][Abstract]

Raphael Hiesgen, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch,
The Race to the Vulnerable: Measuring the Log4j Shell Incident,
In: Proc. of Network Traffic Measurement and Analysis Conference (TMA), p. 1–9, IFIP, June 2022.
[html][pdf][BibTeX][Abstract]

Lena Boeckmann, Peter Kietzmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch,
Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API,
In: Proc. of Embedded Wireless Systems and Networks (EWSN'22), p. 84–95, ACM : New York, USA, October 2022.
[html][pdf][BibTeX][Abstract]

Cenk Gündogan,
Information-centric Networking for the Constrained Internet of Things,
Doctoral Dissertation, July 2022.
[html][pdf][BibTeX][Abstract]

Eric Osterweil, Pouyan Fotouhi Tehrani, Thomas C. Schmidt, Matthias Wählisch,
From the Beginning: Key Transitions in the First 15 Years of DNSSEC,
Transactions on Network and Service Management (TNSM), Vol. 19, No. 4, p. 5265–5283, IEEE Press : Piscataway, NJ, USA, December 2022.
[html][pdf][BibTeX][Abstract]

Timo Häckel, Philipp Meyer, Lukas Stahlbock, Falk Langer, Sebastian A. Eckhardt, Franz Korf, Thomas C. Schmidt,
A Multilayered Security Infrastructure for Connected Vehicles – First Lessons from the Field,
In: 2022 IEEE Intelligent Vehicles Symposium Workshops (IV Workshops), IEEE Press : Piscataway, NJ, USA, May 2022.
[BibTeX][Abstract]

Marcin Nawrocki, Pouyan Fotouhi Tehrani, Raphael Hiesgen, Jonas Mücke, Thomas C. Schmidt, Matthias Wählisch,
On the Interplay between TLS Certificates and QUIC Performance,
In: Proc. of 18th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), p. 204–213, ACM : New York, NY, USA, 2022.
[html][BibTeX][Abstract] Best Paper Award and CoNEXT Community Award

Nils Ollrogge, Peter Kietzmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch,
First Steps Towards FIDO2 for the Internet of Things,
In: Proc. of the 19. GI/ITG KuVS Fachgespräch Sensornetze (FGSN'22), p. 29–32, HTW Berlin : Berlin, Germany, Sep 2022.
[html][BibTeX][Abstract]

Sandra Reider, Philipp Meyer, Timo Häckel, Franz Korf, Thomas C. Schmidt,
Integration realer Angriffe in simulierte Echtzeit- Ethernet-Netzwerke,
In: Echtzeit 2020, ser. Informatik aktuell, p. 51–60, Springer Vieweg : Wiesbaden, January 2021.
[html][BibTeX][Abstract]

Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch,
A Performance Study of Crypto-Hardware in the Low-end IoT,
Technical Report, No. Report 2021/058, January 2021.
[html][BibTeX][Abstract]

Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch,
A Performance Study of Crypto-Hardware in the Low-end IoT,
In: Proc. of Embedded Wireless Systems and Networks (EWSN'21), ACM : New York, USA, February 2021.
[html][BibTeX][Abstract]

Pouyan Fotouhi Tehrani, Eric Osterweil, Jochen Schiller, Thomas C. Schmidt, Matthias Wählisch,
Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI,
In: 30th The Web Conference (WWW'21), p. 2709–2720, ACM : New York, USA, April 2021.
[html][BibTeX][Abstract]

Leandro Lanzieri, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch,
Poster Abstract: Third Party Authorization of LwM2M Clients,
In: Proc. of ACM/IEEE Int. Conf. on Internet of Things Design and Implementation (IoTDI '21), p. 263–264, ACM : New York, NY, USA, May 2021.
[html][BibTeX][Abstract]

Nils Rodday, Italo Cunha, Randy Bush, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt, Matthias Wählisch,
Revisiting RPKI Route Origin Validation on the Data Plane,
In: Proc. of Network Traffic Measurement and Analysis Conference (TMA), IFIP, 2021.
[pdf][BibTeX][Abstract]

Nils Rodday, Lukas Kaltenbach, Italo Cunha, Randy Bush, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt, Matthias Wählisch,
On the Deployment of Default Routes in Inter-domain Routing,
In: Proc. of ACM SIGCOMM Workshop on Technologies, Applications, and Uses of a Responsible Internet (TAURIN'21), p. 14–20, ACM : New York, USA, August 2021.
[html][BibTeX][Abstract]

Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch,
QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events,
In: Proc. of ACM Internet Measurement Conference (IMC), p. 283–291, ACM : New York, 2021.
[html][pdf][Code][BibTeX][Abstract]

Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch,
The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core,
In: Proc. of ACM Internet Measurement Conference (IMC), p. 419–434, ACM : New York, 2021.
[html][pdf][BibTeX][Abstract]

Marcin Nawrocki, Maynard Koch, Thomas C. Schmidt, Matthias Wählisch,
Transparent Forwarders: An Unnoticed Component of the Open DNS Infrastructure,
In: Proc. of 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT)), p. 454–462, ACM : New York, December 2021.
[html][pdf][BibTeX][Abstract]

Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Thomas C. Schmidt, Matthias Wählisch,
Securing name resolution in the IoT: DNS over CoAP,
In: Proc. of 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT - Student Workshop)), ACM, December 2021.
[html][BibTeX][Abstract]

Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch,
Uncovering Vulnerable Industrial Control Systems from the Internet Core,
In: Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 1-9, IEEE Press : Piscataway, NJ, USA, April 2020.
[html][BibTeX][Abstract]

Philipp Meyer, Timo Häckel, Franz Korf, Thomas C. Schmidt,
Network Anomaly Detection in Cars based on Time-Sensitive Ingress Control,
In: Proc. of the IEEE 21th Vehicular Technology Conference: VTC2020-Fall, IEEE Press, October 2020.
[html][BibTeX][Abstract]

Caitlin Gray, Clemens Mosig, Randy Bush, Cristel Pelsser, Matthew Roughan, Thomas C. Schmidt, Matthias Wählisch,
BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping,
In: Proc. of ACM Internet Measurement Conference (IMC), p. 492–505, ACM : New York, 2020.
[html][BibTeX][Abstract]

John Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C. Schmidt, Matthias Wählisch,
On Measuring RPKI Relying Parties,
In: Proc. of ACM Internet Measurement Conference (IMC), p. 484–491, ACM : New York, 2020.
[html][BibTeX][Abstract]

Timo Häckel, Anja Schmidt, Philipp Meyer, Franz Korf, Thomas C. Schmidt,
Strategies for Integrating Controls Flows in Software-Defined In-Vehicle Networks and Their Impact on Network Security,
In: 2020 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2020), IEEE, December 2020.
[BibTeX][Abstract]

Philipp Meyer, Timo Häckel, Falk Langer, Lukas Stahlbock, Jochen Decker, Sebastian A. Eckhardt, Franz Korf, Thomas C. Schmidt, Fabian Schüppel,
Demo: A Security Infrastructure for Vehicular Information Using SDN, Intrusion Detection, and a Defense Center in the Cloud,
In: 2020 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2020), December 2020.
[BibTeX][Abstract]

Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch,
Uncovering Vulnerable Industrial Control Systems from the Internet Core,
Technical Report, No. arXiv:1901.04411, January 2019.
[html][pdf][BibTeX][Abstract]

Vaibhav Bajpai, Anna Brunstrom, Anja Feldmann, Wolfgang Kellerer, Aiko Pras, Henning Schulzrinne, Georgios Smaragdakis, Matthias Wählisch, Klaus Wehrle,
The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research,
ACM SIGCOMM Computer Communication Review, Vol. 49, No. 1, p. 24–30, January 2019.
[pdf][BibTeX][Abstract]

Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Wählisch,
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs,
In: Proc. of ACM Internet Measurement Conference (IMC), p. 435–448, ACM : New York, 2019.
[html][pdf][BibTeX][Abstract]

Pouyan Fotouhi Tehrani, Luca Keidel, Eric Osterweil, Jochen Schiller, Thomas C. Schmidt, Matthias Wählisch,
NDNSSEC: Namespace Management in NDN with DNSSEC,
In: Proc. of 6th ACM Conference on Information-Centric Networking (ICN), Demo Session, p. 171–172, ACM : New York, 2019.
[BibTeX][Abstract]

Pouyan Fotouhi Tehrani, Eric Osterweil, Jochen Schiller, Thomas C. Schmidt, Matthias Wählisch,
The Missing Piece: On Namespace Management in NDN and How DNSSEC Might Help,
In: Proc. of 6th ACM Conference on Information-Centric Networking (ICN), p. 37–43, ACM : New York, 2019.
[html][BibTeX][Abstract]

Philipp Meyer, Timo Häckel, Franz Korf, Thomas C. Schmidt,
DoS Protection through Credit Based Metering - Simulation Based Evaluation for Time-Sensitive Networking in Cars,
In: Proceedings of the 6th International OMNeT++ Community Summit, September 2019.
[BibTeX][Abstract]

Jasper Eumann, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch,
A Reproducibility Study of ``IP Spoofing Detection in Inter-Domain Traffic'',
Technical Report, No. arXiv:1911.05164, November 2019.
[html][pdf][BibTeX][Abstract]

Raphael Hiesgen, Dominik Charousset, Thomas C. Schmidt,
OpenCL Actors–-Adding Data Parallelism to Actor-based Programming with CAF,
In: Programming with Actors - State-of-the-Art and Research Perspectives, (Alessandro Ricci, Philipp Haller Ed.), ser. Lecture Notes on Computer Sciences (LNCS), No. 10789, p. 59–93, Springer Verlag : Berlin, Heidelberg, N.Y., 2018.
[html][BibTeX][Abstract]

Andreas Reuter, Randy Bush, Italo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt, Matthias Wählisch,
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering,
ACM Sigcomm Computer Communication Review, Vol. 48, No. 1, p. 19–27, January 2018.
[html][BibTeX][Abstract] Awarded Best of CCR at SIGCOMM 2018

Peter Kietzmann, Cenk Gündogan, Thomas C. Schmidt, Matthias Wählisch,
A PUF Seed Generator for RIOT: Introducing Crypto-Fundamentals to the Wild,
In: Proc. of 16th ACM International Conference on Mobile Systems, Applications (MobiSys), Poster Session, ACM : New York, NY, USA, June 2018.
[html][BibTeX][Abstract]

Nico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch,
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP,
In: Proc. of ACM SIGCOMM. Poster Session, p. 57–59, ACM : New York, NY, USA, August 2018.
[html][BibTeX][Abstract]

Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch,
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem,
In: Proc. of ACM Internet Measurement Conference (IMC 2018), p. 343–349, ACM : New York, NY, USA, October 2018.
[html][BibTeX][Abstract]

Reuter, Andreas, Bush, Randy, Cunha, Italo, Katz-Bassett, Ethan, Thomas C. Schmidt, Matthias Wählisch,
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering,
In: Proceedings of the Applied Networking Research Workshop, ser. ANRW '18, p. 7–7, ACM : New York, NY, USA, 2018.
[html][BibTeX][Details]

Michael Frey, Cenk Gündogan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch,
Security for the Industrial IoT: The Case for Information-Centric Networking,
Technical Report, No. arXiv:1810.04645, October 2018.
[html][BibTeX][Details]

Andreas Reuter, Randy Bush, \'Italo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt, Matthias Wählisch,
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering,
Technical Report, No. arXiv:1706.04263, June 2017.
[html][BibTeX][Abstract]

Philipp Meyer, Raphael Hiesgen, Thomas C. Schmidt, Marcin Nawrocki, Matthias Wählisch,
Towards Distributed Threat Intelligence in Real-Time,
In: Proceedings of SIGCOMM Posters and Demos '17, Demo Session, ACM : New York, NY, USA, August 2017.
[pdf][BibTeX][Abstract]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
TRAIL: Topology Authentication in RPL,
In: Proc. of Embedded Wireless Systems and Networks (EWSN '16), p. 59–64, ACM : New York, NY, USA, Feb. 2016.
[pdf][BibTeX][Abstract]

Martin Landsmann, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch,
Demo: Topological Robustness of RPL with TRAIL,
In: Proc. of Embedded Wireless Systems and Networks (EWSN '16), Demonstration, p. 219–220, ACM : New York, NY, USA, Feb. 2016.
[html][BibTeX][Abstract]

Matthias Wählisch,
Measuring and Implementing Internet Backbone Security: Current Challenges, Upcoming Deployment, and Future Trends,
Doctoral Dissertation, February 2016.
[html][BibTeX][Abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Let's Collect Names: How PANINI Limits FIB Tables in Name Based Routing,
In: Proc. of 15th IFIP Networking Conference, p. 458–466, IEEE Press : Piscataway, NJ, USA, May 2016.
[pdf][BibTeX][Abstract]

Johann Schlamp, Matthias Wählisch, Thomas C. Schmidt, Georg Carle, Ernst W. Biersack,
CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP,
Technical Report, No. arXiv:1605.00618, May 2016.
[html][BibTeX][Abstract]

Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder,
A Survey on Honeypot Software and Data Analysis,
Technical Report, No. arXiv:1608.06249, 2016.
[html][BibTeX][Abstract]

Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
TRAIL: Topology Authentication in RPL,
Technical Report, No. arXiv:1312.0984, December 2015.
[html][BibTeX][Details]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
In: Traffic Monitoring and Analysis, ser. LNCS, Vol. 9053, p. 188–201, Springer-Verlag, April 2015.
[BibTeX][Abstract]

Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt,
RPKI MIRO: Monitoring and Inspection of RPKI Objects,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 107-108, ACM : New York, August 2015.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt,
See How ISPs Care: An RPKI Validation Extension for Web Browsers,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 115-116, ACM : New York, August 2015.
[html][pdf][BibTeX][Abstract]

Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch,
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC,
In: Proc. of ACM SIGCOMM, Poster Session, p. 603–604, ACM : New York, August 2015.
[html][pdf][BibTeX][Abstract]

Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, Thomas C. Schmidt,
Amplification and DRDoS Attack Defense – A Survey and New Perspectives,
Technical Report, No. arXiv:1505.07892, June 2015.
[html][BibTeX][Abstract]

Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch,
Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics,
In: Proc. of 9th USENIX Security Workshop on Offensive Technologies (WOOT), p. 1–8, USENIX Assoc. : Berkeley, CA, USA, 2015.
[html][BibTeX][Abstract]

Thomas C. Schmidt, Sebastian Wölke, Nora Berg, Matthias Wählisch,
Partial Adaptive Name Information in ICN: PANINI Routing Limits FIB Table Sizes,
In: 2nd ACM Conference on Information-Centric Networking, Poster Session, ser. ICN 2015, p. 193–194, ACM : New York, Oct. 2015.
[pdf][BibTeX][Abstract]

Samir Al-Sheikh, Matthias Wählisch, Thomas C. Schmidt,
Revisiting Countermeasures Against NDN Interest Flooding,
In: 2nd ACM Conference on Information-Centric Networking, Poster Session, ser. ICN 2015, p. 195–196, ACM : New York, Oct. 2015.
[pdf][BibTeX][Abstract]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig, Gareth Tyson,
RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem,
In: Proc. of 14th ACM Workshop on Hot Topics in Networks (HotNets), p. 11:1–11:7, ACM : New York, Nov. 2015.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt,
See How ISPs Care: An RPKI Validation Extension for Web Browsers,
SIGCOMM Comput. Commun. Rev., Vol. 45, No. 5, pp. 115-116, ACM : New York, NY, USA, 2015.
[BibTeX][Details]

Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch,
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC,
SIGCOMM Comput. Commun. Rev., Vol. 45, No. 5, p. 603–604, ACM : New York, NY, USA, 2015.
[BibTeX][Details]

Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt,
RPKI MIRO: Monitoring and Inspection of RPKI Objects,
SIGCOMM Comput. Commun. Rev., Vol. 45, No. 5, p. 107–108, ACM : New York, NY, USA, 2015.
[BibTeX][Abstract]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Wählisch,
Resource Public Key Infrastructure (RPKI) Router Implementation Report,
RFC, No. 7128, February 2014.
[html][BibTeX][Abstract]

Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch,
Native Actors: How to Scale Network Forensics,
In: Proc. of ACM SIGCOMM, Demo Session, p. 141–142, ACM : New York, August 2014.
[pdf][BibTeX][Abstract]

Emmanuel Baccelli, Oliver Hahm, Matthias Wählisch,
Spontaneous Wireless Networking to Counter Pervasive Monitoring,
In: Proc. of W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT), 2014.
[html][BibTeX][Details]

Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig,
When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites,
Technical Report, No. arXiv:1408.0391, September 2014.
[html][BibTeX][Abstract]

Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle,
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire,
Technical Report, No. arXiv:1412.5052, December 2014.
[html][BibTeX][Abstract]

Felix Gomez Marmol, Christoph Sorge, Osman Ugus, Gregorio Martinez Perez,
WSANRep, WSAN Reputation-Based Selection in Open Environments,
Wireless Personal Communications, Vol. 68, No. 3, p. 921–937, Springer, February 2013.
[BibTeX][Details]

Felix Gomez Marmol, Christoph Sorge, Ronald Petrlic, Osman Ugus, Dirk Westhoff, Gregorio Martinez Perez,
Privacy Enhanced Architecture for Smart Metering,
International Journal of Information Security, Vol. 12, No. 2, p. 67–82, Springer, April 2013.
[BibTeX][Abstract]

Dirk Westhoff, Osman Ugus,
Malleability Resilient (Premium) Concealed Data Aggregation,
In: Proc. of the 4th IEEE Int. Work. on Data Security and Privacy in Wireless Networks (D-SPAN'13), IEEE Press : Madrid, Spain, June 2013.
[BibTeX][Details]

Randy Bush, Rob Austein, Keyur Patel, Hannes Gredler, Matthias Wählisch,
RPKI Router Implementation Report,
IETF Internet Draft – work in progress, No. 05, December 2013.
[html][BibTeX][Abstract]

Matthias Wählisch, André Vorbach, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen H. Schiller,
Design, Implementation, and Operation of a Mobile Honeypot,
Technical Report, No. arXiv:1205.4778, 2013.
[html][BibTeX][Abstract]

Martin Landsmann, Heiner Perrey, Osman Ugus, Matthias Wählisch, Thomas C. Schmidt,
Topology Authentication in RPL,
In: Proc. of the 32nd IEEE INFOCOM. Poster, IEEE Press : Piscataway, NJ, USA, April 2013.
[pdf][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Lessons from the Past: Why Data-driven States Harm Future Information-Centric Networking,
In: Proc. of IFIP Networking, IEEE Press : Piscataway, NJ, USA, 2013.
[pdf][BibTeX][Abstract]

Matthias Wählisch, Emmanuel Baccelli, Jochen Schiller, Agnènes Voisard, Thomas C. Schmidt, Stefan Pfennigschmidt, Mark Palkow, Uwe Weigmann, Uwe Hanewald,
Technische Dimensionen der Flughafensicherheit,
Crisis Prevention, No. 1, p. 15–16, Jan. 2013.
[BibTeX][Details]

Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller,
Updates from the Internet Backbone,
In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, The Internet Society, February 2013.
[html][BibTeX][Details]

Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller,
RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation,
In: Proc. of USENIX Security Workshop CSET'13, USENIX Assoc. : Berkeley, CA, USA, 2013.
[html][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Backscatter from the Data Plane – Threats to Stability and Security in Information-Centric Network Infrastructure,
Computer Networks, Vol. 57, No. 16, p. 3192–3206, Elsevier, Nov. 2013.
[html][pdf][BibTeX][Abstract]

Thomas C. Schmidt, Matthias Wählisch, Dominik Charousset, Sebastian Meiling,
On Name-based Group Communication: Challenges, Concepts, and Transparent Deployment,
Computer Communications, Vol. 36, No. 15--16, p. 1657–1664, Elsevier, Sep--Oct 2013.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch,
Conference Reports. Sec '13: 22nd USENIX Security Symposium. Large Scale Systems Security III,
;login:, Vol. 38, No. 6, p. 29–31, Dec. 2013.
[BibTeX][Details]

Felix Gomez Marmol, Christoph Sorge, Osman Ugus, Gregorio Martinez Perez,
Do Not Snoop My Habits: Preserving Privacy in the Smart Grid,
IEEE Communications Magazine, Vol. 50, No. 5, p. 166–172, IEEE, May 2012.
[BibTeX][Details]

Osman Ugus, Dirk Westhoff, Hariharan Rajasekaran,
A leaky bucket called smartphone,
In: 4th Workshop on Security and Social Networks (SESOC'12), p. 374–380, IEEE : Lugano, Switzerland, March 2012.
[BibTeX][Details]

Osman Ugus, Martin Landsmann, Dennis Gessner, Dirk Westhoff,
A Smartphone Security Architecture for App Verification and Process Authentication,
In: 21st International Conference on Computer Communications and Networks (ICCCN'12), p. 1–9, IEEE : Munich, Germany, August 2012.
[BibTeX][Details]

Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge,
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture,
In: International Conference on Security and Cryptography (SECRYPT'12), p. 102–112, July 2012.
[BibTeX][Details]

Osman Ugus,
Secure and Reliable Remote Programming in Wireless Sensor Networks,
Doctoral Dissertation, 2012.
[pdf][BibTeX][Details]

Emmanuel Baccelli, Lars Gerhold, Christophe Guettier, Jochen Schiller, Thomas C. Schmidt, Genevieve Sella, Ulrich Meissen, Agnes Voisard, Matthias Wählisch, Georg Wittenburg,
SAFEST: A Framework for Early Security Triggers in Public Spaces,
In: Proc. of WISG 2012 – Workshop Interdisciplinaire sur la Securite Globale, January 2012.
[html][BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Backscatter from the Data Plane –- Threats to Stability and Security in Information-Centric Networking,
Technical Report, No. arXiv:1205.4778, 2012.
[html][BibTeX][Abstract]

Matthias Wählisch, Olaf Maennel, Thomas C. Schmidt,
Towards Detecting BGP Route Hijacking using the RPKI,
In: Proc. of ACM SIGCOMM, Poster Session, pp. 103-104, ACM : New York, August 2012.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp,
Bulk of Interest: Performance Measurement of Content-Centric Routing,
In: Proc. of ACM SIGCOMM, Poster Session, pp. 99-100, ACM : New York, August 2012.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Sebastian Trapp, Christian Keil, Jochen Schönfelder, Thomas C. Schmidt, Jochen Schiller,
First Insights from a Mobile Honeypot,
In: Proc. of ACM SIGCOMM, Poster Session, pp. 305-306, ACM : New York, August 2012.
[html][pdf][BibTeX][Abstract]

Matthias Wählisch, Sebastian Trapp, Jochen Schiller, Benjamin Jochheim, Theodor Nolte, Thomas C. Schmidt, Osman Ugus, Dirk Westhoff, Martin Kutscher, Matthias Küster, Christian Keil, Jochen Schönfelder,
Vitamin C for your Smartphone: The SKIMS Approach for Cooperative and Lightweight Security at Mobiles,
In: Proc. of ACM SIGCOMM, Demo Session, pp. 271-272, ACM : New York, August 2012.
[html][pdf][BibTeX][Abstract]

Alban Hessler, Takahiro Kakumaru, Heiner Perrey, Dirk Westhoff,
Data Obfuscation for Network Coding,
Computer Communications, Vol. 35, No. 1, p. 48–61, Elsevier, January 2012.
[BibTeX][Details]

Heiner Perrey, Osman Ugus, Dirk Westhoff,
WiSec' 2011 Poster: Security Enhancement for Bluetooth Low Energy with Merkle's Puzzle,
SIGMOBILE Mob. Comput. Commun. Rev. (MC2R), Vol. 15, No. 3, p. 45–46, ACM, November 2011.
[BibTeX][Details]

Osman Ugus, Dirk Westhoff,
An MTM-based Watchdog for Malware Famishment in Smartphones,
In: 11th International Conference on Innovative Internet Community Services (I$^2$CS'11), p. 251–262, June 2011.
[BibTeX][Details]

Jens-Matthias Bohli, Alban Hessler, Klaus Meier, Osman Ugus, Dirk Westhoff,
Dependable Over-the-Air Programming,
Adhoc \& Sensor Wireless Networks, Vol. 13, No. 3-4, p. 313–340, 2011.
[BibTeX][Details]

Thomas C. Schmidt, Gabriel Hege, Matthias Wählisch, Hans L. Cycon, Mark Palkow, Detlev Marpe,
Distributed SIP Conference Management with Autonomously Authenticated Sources and its Application to an H.264 Videoconferencing Software for Mobiles,
Multimedia Tools and Applications, Vol. 53, No. 2, p. 349–370, Springer Verlag : Berlin, Heidelberg, June 2011.
[html][pdf][BibTeX][Abstract]

Thomas C. Schmidt, Matthias Wählisch, Michael Gröning,
Context-adaptive Entropy Analysis as a Lightweight Detector of Zero-day Shellcode Intrusion for Mobiles,
In: Poster at the ACM WiSec, ACM : New York, June 2011.
[BibTeX][Abstract]

Matthias Wählisch, Thomas C. Schmidt, Markus de Brün, Thomas Häberlen,
Exposure of the German Research Internet Infrastructure,
In: Proc. of the TERENA Networking Conference, p. Poster, Terena : Amsterdam, Mai 2011.
[html][BibTeX][Details]

Benjamin Jochheim, Thomas C. Schmidt, Matthias Wählisch,
A Signature-free approach to malicious code detection by applying entropy analysis to network streams,
In: Proc. of the TERENA Networking Conference, p. Poster, Terena : Amsterdam, Mai 2011.
[html][BibTeX][Details] Student Poster Award

Thomas C. Schmidt, Matthias Wählisch, Benjamin Jochheim, Michael Gröning,
WiSec 2011 Poster: Context-adaptive Entropy Analysis as a Lightweight Detector of Zero-day Shellcode Intrusion for Mobiles,
ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 15, No. 3, p. 47–48, ACM : New York, July 2011.
[BibTeX][Details]

Sebastian Trapp, Matthias Wählisch, Jochen Schiller,
Short Paper: Can Your Phone Trust Your Friend Selection?,
In: Proc. of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), p. 69–74, ACM : New York, 2011.
[pdf][BibTeX][Abstract]

Jens-Matthias Bohli, Christoph Sorge, Osman Ugus,
A Privacy Model for Smart Metering,
In: First International Workshop on Smart Grid Communications (in conjunction with IEEE ICC'10), IEEE : Cape Town, South Africa, May 2010.
[BibTeX][Details]

Nicola Bui, Osman Ugus, Moreno Dissegna, Michele Rossi, Michele Zorzi,
An integrated system for secure code distribution in Wireless Sensor Networks,
In: 6th PerCom Workshop on Pervasive Wireless Networking (PWN'10), p. 575–581, IEEE : Mannheim, Germany, April 2010.
[BibTeX][Details]

Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff,
Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen),
it - Information Technology, Vol. 52, No. 6, p. 313–319, 2010.
[BibTeX][Details]

Osman Ugus, Dirk Westhoff, Jens-Matthias Bohli,
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier T-time signature scheme,
In: the second ACM conference on Wireless network security (WiSec'09), p. 29–40, ACM : Zurich, Switzerland, March 2009.
[BibTeX][Details]

Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff,
Security enhanced multi-hop over the air reprogramming with Fountain Codes,
In: 34th Conference on Local Computer Networks (LCN'09), p. 850–857, IEEE : Zurich, Switzerland, October 2009.
[BibTeX][Details]

Klaus Meier, Alban Hessler, Osman Ugus, Jörg Keller, Dirk Westhoff,
Multi-Hop Over-The-Air Reprogramming of Wireless Sensor Networks using Fuzzy Control and Fountain Codes,
In: Workshop of Self-Organising Wireless Sensor and Communication Networks (Somsed'09), October 2009.
[BibTeX][Details]

Matthias Wählisch, Thomas C. Schmidt, Gabriel Hege,
Overlay AuthoCast: Distributed Sender Authentication in Overlay Multicast,
In: Proceedings of the 28th IEEE INFOCOM. Student Workshop, IEEE Press : Piscataway, NJ, USA, April 2009.
[pdf][BibTeX][Abstract]

Hans L. Cycon, Gabriel Hege, Detlev Marpe, Mark Palkow, Thomas C. Schmidt, Matthias Wählisch,
Connecting the Worlds: Multipoint Videoconferencing Integrating H.323 and IPv4, SIP and IPv6 with Autonomous Sender Authentication,
In: ISCE2009 –- 13th International Symposium on Consumer Electronics, p. 890–893, IEEE Press : Piscataway, NJ, USA, May 2009.
[pdf][BibTeX][Abstract]

Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff,
A secure and resilient WSN roadside architecture for intelligent transport systems,
In: the first ACM conference on Wireless network security (WiSec'08), p. 161–171, ACM : Alexandria, VA, USA, March 2008.
[BibTeX][Details]

Osman Ugus, Takahiro Kakumaru, Dirk Westhoff,
On the Insecurity of Available Code Update Mechanism and its Improvements,
In: IEICE society conference, September 2008.
[BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ,
AuthoCast –- A Protocol for Mobile Multicast Sender Authentication,
In: MoMM 2008 - 6th International Conference on Advances in Mobile Computing & Multimedia, (Gabriele Kotsis, David Taniar, Eric Pardede, Ismail Khalil Ed.), ACM, p. 142–149, ACM : Linz, AU, November 2008.
[BibTeX][Abstract]

Thomas C. Schmidt, Olaf Christ, Matthias Wählisch,
Autonome Zertifizierung mobiler Multicast-Sender – AuthoCast –,
In: Endausscheidung für den Deutschen IT Sicherheitspreis 2008, Horst Görtz Stiftung, October 2008.
[pdf][BibTeX][Details]

Thomas C. Schmidt, Matthias Wählisch, Olaf Christ, Gabriel Hege,
AuthoCast –- a mobility-compliant protocol framework for multicast sender authentication,
Security and Communication Networks, Vol. 1, No. 6, p. 495 – 509, Wiley & Sons, Ltd, December 2008.
[html][pdf][BibTeX][Abstract]

Osman Ugus, Alban Hessler, Dirk Westhoff,
Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS,
In: 6th Fachgespräch Drahtlose Sensornetze, p. 55–58, July 2007.
[BibTeX][Details]

Osman Ugus, Dirk Westhoff, Ralf Laue, Abdul Shoufan, Sorin A. Huss,
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks,
In: 2nd Workshop on Embedded Systems Security (WESS'07), p. 11–16, IEEE/ACM : Salzburg, Austria, October 2007.
[BibTeX][Details]

 


This page generated by bibTOhtml on Tue 19 Mar 2024 12:05:04 AM UTC