2024
ACCESS-FL: Agile Communication and Computation for Efficient Secure Aggregation in Stable Federated Learning Networks.
CoRR, 2024
Analysis of DNS Dependencies and their Security Implications in Australia: A Comparative Study of General and Indigenous Populations.
CoRR, 2024
LanDscAPe: Exploring LDAP weaknesses and data leaks at Internet scale.
Proceedings of the 33rd USENIX Security Symposium, 2024
Boosting Communication Efficiency of Federated Learning's Secure Aggregation.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Is a Name Enough? A First Look into Detecting Clouds Using DNS Pointer Records.
Proceedings of the 20th International Conference on Network and Service Management, 2024
Assessing the security of Internet paths: A case study of Dutch critical infrastructures.
Proceedings of the 2024 Applied Networking Research Workshop, 2024
2023
Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns.
PACMNET, 2023
Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023
Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023
DNS Dependencies as an Expression of the Digital Divide: The Example of Australia.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Towards Security Transparency of Autonomous Systems on the Internet.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care?
Proceedings of the 18th International Conference on Network and Service Management, 2022
2020
A Responsible Internet to Increase Trust in the Digital World.
,
,
,
,
,
,
,
,
,
,
,
J. Netw. Syst. Manag., 2020
An empirical study of availability and reliability properties of the Bitcoin Lightning Network.
CoRR, 2020
Update on ACM SIGCOMM CCR reviewing process: towards a more open review process.
,
,
,
,
,
,
,
,
,
,
,
,
Comput. Commun. Rev., 2020
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
Comput. Commun. Rev., 2020
<i>LoRadar</i>: LoRa sensor network monitoring through passive packet sniffing.
Comput. Commun. Rev., 2020
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020
Triplet Mining-based Phishing Webpage Detection.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
2019
The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods.
CoRR, 2019
Open collaborative hyperpapers: a call to action.
Comput. Commun. Rev., 2019
2018
Vandal: A Scalable Security Analysis Framework for Smart Contracts.
CoRR, 2018
A First Look at Certification Authority Authorization (CAA).
,
,
,
,
,
,
,
,
,
,
Comput. Commun. Rev., 2018
In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem.
Proceedings of the Internet Measurement Conference 2018, 2018
Measuring Adoption of Security Additions to the HTTPS Ecosystem.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Applied Networking Research Workshop, 2018
2017
On Availability for Blockchain-Based Systems.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017
Mission accomplished?: HTTPS security after diginotar.
Proceedings of the 2017 Internet Measurement Conference, 2017
Automated Analysis of Secure Internet of Things Protocols.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
HEAP: Reliable Assessment of BGP Hijacking Attacks.
IEEE J. Sel. Areas Commun., 2016
New kids on the block: an analysis of modern blockchains.
CoRR, 2016
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Endpoint-Transparent Multipath Transport with Software-Defined Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
2015
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).
RFC, May, 2015
Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS).
RFC, February, 2015
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015
An Early Look at Multipath TCP Deployment in the Wild.
Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale Measurement, 2015
Securing a Deployment Pipeline.
Proceedings of the 3rd IEEE/ACM International Workshop on Release Engineering, 2015
2014
Empirical analysis of Public Key Infrastructures and Investigation of Improvements.
PhD thesis, 2014
A deeper understanding of SSH: Results from Internet-wide scans.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
2012
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle.
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
On Using TPM for Secure Identities in Future Home Networks.
Future Internet, 2011
The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
Investigating the OpenPGP Web of Trust.
Proceedings of the Computer Security - ESORICS 2011, 2011
2010
Towards Measurement Consolidation for Overlay Optimization and Service Placement.
Prax. Inf.verarb. Kommun., 2010
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM.
Proceedings of the Principles, 2010
2009
CLIO - A Cross-Layer Information Service for Overlay Network Optimization.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009
On Using Home Networks and Cloud Computing for a Future Internet of Things.
Proceedings of the Future Internet - FIS 2009, Second Future Internet Symposium, 2009
2008
Spontaneous Virtual Networks: On the Road Towards the Internet's Next Generation.
it Inf. Technol., 2008
Trust-Rated Authentication for Domain-Structured Distributed Systems.
Proceedings of the Public Key Infrastructure, 2008
08102 Outcome Working Group -- Situational Awareness.
,
,
,
,
,
,
,
,
,
,
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
08102 Working Group -- Intrusion and Fraud Detection for Web Services.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008