Haya Schulmann

Orcid: 0000-0002-8130-0472

Affiliations:
  • Goethe University Frankfurt, Frankfurt am Main, Germany
  • National Research Center for Applied Cybersecurity ATHENE, Germany


According to our database1, Haya Schulmann authored at least 128 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ZPredict: ML-Based IPID Side-channel Measurements.
ACM Trans. Priv. Secur., November, 2024

Wie Deutschland zur Cybernation wird.
Datenschutz und Datensicherheit (dud), January, 2024

RPKI: Not Perfect But Good Enough.
CoRR, 2024

SoK: An Introspective Analysis of RPKI Security.
CoRR, 2024

Attacking with Something That Does Not Exist: Low-Rate Flood with 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.
CoRR, 2024

Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

Insights into SAV Implementations in the Internet.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

The CURE to Vulnerabilities in RPKI Validation.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Crowdsourced Distributed Domain Validation.
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024

Poster: Security of Login Interfaces in Modern Organizations.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Poster: From Fort to Foe: The Threat of RCE in RPKI.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Byzantine-Secure Relying Party for Resilient RPKI.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Poster: Kill Krill or Proxy RPKI.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

External Attack-Surface of Modern Organizations.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Protocol Fixes for KeyTrap Vulnerabilities.
Proceedings of the 2024 Applied Networking Research Workshop, 2024

2023
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates.
PACMNET, 2023

Aktive Cyberabwehr.
Datenschutz und Datensicherheit, 2023

Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet.
Proceedings of the 32nd USENIX Security Symposium, 2023

Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones.
Proceedings of the 32nd USENIX Security Symposium, 2023

Poster: LeMon: Global Route Leak Monitoring Service.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Beyond Limits: How to Disable Validators in Secure Networks.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Poster: Off-Path DNSSEC Downgrade Attacks.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Poster: Longitudinal Analysis of DoS Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Special issue ESORICS 2021.
J. Comput. Secur., 2022

XDRI Attacks - and - How to Enhance Resilience of Residential Routers.
Proceedings of the 31st USENIX Security Symposium, 2022

Stalloris: RPKI Downgrade Attack.
Proceedings of the 31st USENIX Security Symposium, 2022

Smart RPKI Validation: Avoiding Errors and Preventing Hijacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

How (Not) to Deploy Cryptography on the Internet.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Poster: DNS in Routers Considered Harmful.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Insights into Global Deployment of RPKI Validation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: RPKI Kill Switch.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Behind the Scenes of RPKI.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: The Unintended Consequences of Algorithm Agility in DNSSEC.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Privacy Preserving and Resilient RPKI.
IACR Cryptol. ePrint Arch., 2021

Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS.
Proceedings of the 30th USENIX Security Symposium, 2021

The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources.
Proceedings of the 30th USENIX Security Symposium, 2021

From IP to transport and beyond: cross-layer attacks against applications.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

SSLChecker.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Optimized BGP Simulator for Evaluation of Internet Hijacks.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Privacy Policies of Mobile Apps - A Usability Study.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Poster: WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Poster: Fragmentation Attacks on DNS over TCP.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Poster: Off-path VoIP Interception Attacks.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Machine Learning Analysis of IP ID Applications.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Negotiating PQC for DNSSEC.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

The Master and Parasite Attack.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Let's Downgrade Let's Encrypt.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Evaluating Resilience of Domains in PKI.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

DNS-over-TCP considered vulnerable.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

SMap: Internet-wide Scanning for Spoofing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
DISCO: Sidestepping RPKI's Deployment Barriers.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Optimal Transport Layer for Secure Computation.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Blocking Email Bombs with EmailGlass.
Proceedings of the IEEE Global Communications Conference, 2020

Cryptanalysis of FNV-Based Cookies.
Proceedings of the IEEE Global Communications Conference, 2020

MPC for Securing Internet Infrastructure.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Diving into Email Bomb Attack.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Secure Consensus Generation with Distributed DoH.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

The Impact of DNS Insecurity on Time.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Performance penalties of resilient SDN infrastructures.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

Black-box caches fingerprinting.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

Limiting the Power of RPKI Authorities.
Proceedings of the ANRW '20: Applied Networking Research Workshop, 2020

2019
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
IACR Cryptol. ePrint Arch., 2019

Optimizing Transport Layer for Secure Computation.
IACR Cryptol. ePrint Arch., 2019

Distributed Domain Validation (DDV).
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

Internet As a Source of Randomness.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

Transputation: Transport Framework for Secure Computation.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

2018
Path MTU Discovery Considered Harmful.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018

Practical Experience: Methodologies for Measuring Route Origin Validation.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Removing the Bottleneck for Practical 2PC.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Off-Path Attacks Against PKI.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Domain Validation++ For MitM-Resilient PKI.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Authentication-Bypass Vulnerabilities in SOHO Routers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

Internet-wide study of DNS cache injections.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Towards Enhancing the Visual Analysis of Interdomain Routing.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 3: IVAPP, Porto, Portugal, February 27, 2017

Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

POSTER: X-Ray Your DNS.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Are We There Yet? On RPKI's Deployment and Security.
IACR Cryptol. ePrint Arch., 2016

Obfuscation Combiners.
IACR Cryptol. ePrint Arch., 2016

Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Towards Automated Measurements of Internet's Naming Infrastructure.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

NetCo: Reliable Routing With Unreliable Routers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Stratum Filtering: Cloud-based Detection of Attack Sources.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

DNSSEC Misconfigurations in Popular Domains.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
IEEE Internet Comput., 2015

Detection and Forensics of Domains Hijacking.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Security of Internet Naming Infrastructure.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Sci. Eng. Ethics, 2014

Retrofitting Security into Network Protocols: The Case of DNSSEC.
IEEE Internet Comput., 2014

Off-Path Hacking: The Illusion of Challenge-Response Authentication.
IEEE Secur. Priv., 2014

DNSSEC for cyber forensics.
EURASIP J. Inf. Secur., 2014

Pretty Bad Privacy: Pitfalls of DNS Encryption.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Towards Forensic Analysis of Attacks with DNSSEC.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

POSTER: On the Resilience of DNS Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Negotiating DNSSEC Algorithms over Legacy Proxies.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Less is more: cipher-suite negotiation for DNSSEC.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

DNS authentication as a service: preventing amplification attacks.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Oblivious and fair server-aided two-party computation.
Inf. Secur. Tech. Rep., 2013

Towards Adoption of DNSSEC: Availability and Security Challenges.
IACR Cryptol. ePrint Arch., 2013

Ethical Considerations when Employing Fake Identities in OSN for Research.
CoRR, 2013

Vulnerable Delegation of DNS Resolution.
Proceedings of the Computer Security - ESORICS 2013, 2013

DNSSEC: Security and availability challenges.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Provenance of exposure: Identifying sources of leaked documents.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Cloudoscopy: services discovery and topology mapping.
Proceedings of the CCSW'13, 2013

Socket overloading for fun and cache-poisoning.
Proceedings of the Annual Computer Security Applications Conference, 2013

DNSSEC: Interoperability Challenges and Transition Mechanisms.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Limiting MitM to MitE Covert-Channels.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Unilateral Antidotes to DNS Cache Poisoning
CoRR, 2012

Fragmentation Considered Poisonous
CoRR, 2012

Security of Patched DNS.
Proceedings of the Computer Security - ESORICS 2012, 2012

Antidotes for DNS Poisoning by Off-Path Adversaries.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Unilateral Antidotes to DNS Poisoning.
Proceedings of the Security and Privacy in Communication Networks, 2011

2010
Secure Guaranteed Computation.
IACR Cryptol. ePrint Arch., 2010

Robust Combiner for Obfuscators.
IACR Cryptol. ePrint Arch., 2010

Stealth DoS Attacks on Secure Channels.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Stealth-MITM DoS Attacks on Secure Channels
CoRR, 2009

2008
Towards a Theory of White-Box Security.
IACR Cryptol. ePrint Arch., 2008

Robust Combiners for Software Hardening.
IACR Cryptol. ePrint Arch., 2008


  Loading...