Michael Waidner

Orcid: 0000-0001-7919-9961

Affiliations:
  • National Research Center for Applied Cybersecurity ATHENE, germany
  • Technische Universität Darmstadt, Germany
  • Fraunhofer-Institut für sichere Informationstechnologie SIT, Germany


According to our database1, Michael Waidner authored at least 169 papers between 1985 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2004, "For contributions to the theory and practice of information security, privacy and cryptography.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Kryptoagilität.
Datenschutz und Datensicherheit (dud), October, 2024

Wie Deutschland zur Cybernation wird.
Datenschutz und Datensicherheit (dud), January, 2024

RPKI: Not Perfect But Good Enough.
CoRR, 2024

SoK: An Introspective Analysis of RPKI Security.
CoRR, 2024

Attacking with Something That Does Not Exist: Low-Rate Flood with 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.
CoRR, 2024

Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

The CURE to Vulnerabilities in RPKI Validation.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Crowdsourced Distributed Domain Validation.
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024

Poster: Security of Login Interfaces in Modern Organizations.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Poster: From Fort to Foe: The Threat of RCE in RPKI.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Byzantine-Secure Relying Party for Resilient RPKI.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Poster: Kill Krill or Proxy RPKI.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

External Attack-Surface of Modern Organizations.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Protocol Fixes for KeyTrap Vulnerabilities.
Proceedings of the 2024 Applied Networking Research Workshop, 2024

2023
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates.
PACMNET, 2023

Aktive Cyberabwehr.
Datenschutz und Datensicherheit, 2023

Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet.
Proceedings of the 32nd USENIX Security Symposium, 2023

Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones.
Proceedings of the 32nd USENIX Security Symposium, 2023

Beyond Limits: How to Disable Validators in Secure Networks.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Poster: Off-Path DNSSEC Downgrade Attacks.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Poster: Longitudinal Analysis of DoS Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Special issue ESORICS 2021.
J. Comput. Secur., 2022

XDRI Attacks - and - How to Enhance Resilience of Residential Routers.
Proceedings of the 31st USENIX Security Symposium, 2022

Stalloris: RPKI Downgrade Attack.
Proceedings of the 31st USENIX Security Symposium, 2022

Smart RPKI Validation: Avoiding Errors and Preventing Hijacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

Poster: DNS in Routers Considered Harmful.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Insights into Global Deployment of RPKI Validation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: RPKI Kill Switch.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Behind the Scenes of RPKI.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: The Unintended Consequences of Algorithm Agility in DNSSEC.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources.
Proceedings of the 30th USENIX Security Symposium, 2021

From IP to transport and beyond: cross-layer attacks against applications.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

SSLChecker.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Poster: Fragmentation Attacks on DNS over TCP.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Poster: Off-path VoIP Interception Attacks.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

The Master and Parasite Attack.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Let's Downgrade Let's Encrypt.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Evaluating Resilience of Domains in PKI.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

DNS-over-TCP considered vulnerable.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

2020
Blocking Email Bombs with EmailGlass.
Proceedings of the IEEE Global Communications Conference, 2020

Cryptanalysis of FNV-Based Cookies.
Proceedings of the IEEE Global Communications Conference, 2020

Diving into Email Bomb Attack.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Secure Consensus Generation with Distributed DoH.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

The Impact of DNS Insecurity on Time.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Performance penalties of resilient SDN infrastructures.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

Black-box caches fingerprinting.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Distributed Domain Validation (DDV).
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

Internet As a Source of Randomness.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

2018
Path MTU Discovery Considered Harmful.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Practical Experience: Methodologies for Measuring Route Origin Validation.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Removing the Bottleneck for Practical 2PC.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Off-Path Attacks Against PKI.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Domain Validation++ For MitM-Resilient PKI.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Authentication-Bypass Vulnerabilities in SOHO Routers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

Internet-wide study of DNS cache injections.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

POSTER: X-Ray Your DNS.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
HbbTV Security and Privacy: Issues and Challenges.
IEEE Secur. Priv., 2016

Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Towards Automated Measurements of Internet's Naming Infrastructure.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

NetCo: Reliable Routing With Unreliable Routers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Stratum Filtering: Cloud-based Detection of Attack Sources.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

DNSSEC Misconfigurations in Popular Domains.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
Datenschutz und Datensicherheit, 2015

Detection and Forensics of Domains Hijacking.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Security of Internet Naming Infrastructure.
Proceedings of the Computer Security - ESORICS 2015, 2015

Security and privacy challenges in industrial internet of things.
Proceedings of the 52nd Annual Design Automation Conference, 2015

2014
DNSSEC for cyber forensics.
EURASIP J. Inf. Secur., 2014

Towards Forensic Analysis of Attacks with DNSSEC.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Personal DLP for Facebook.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
Proceedings of the Applied Cryptography and Network Security, 2014

2012
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
Prax. Inf.verarb. Kommun., 2012

Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281).
Dagstuhl Reports, 2012

2011
Andreas Pfitzmann 1958 - 2010.
it Inf. Technol., 2011

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Reports, 2011

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Manifestos, 2011

2010
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society.
Proceedings of the Privacy and Identity Management for Life, 2010

2007
Preface.
J. Comput. Secur., 2007

Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

2006
Service-oriented Assurance - Comprehensive Security by Explicit Assurances.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Cryptographically Sound Theorem Proving.
IACR Cryptol. ePrint Arch., 2006

Reactively Simulatable Certified Mail.
IACR Cryptol. ePrint Arch., 2006

Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
IACR Cryptol. ePrint Arch., 2006

Formal Methods and Cryptography.
Proceedings of the FM 2006: Formal Methods, 2006

Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Proceedings of the Computer Security, 2006

Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy.
IEEE Trans. Dependable Secur. Comput., 2005

Reactively secure signature schemes.
Int. J. Inf. Sec., 2005

Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library.
Int. J. Inf. Sec., 2005

2004
Polynomial liveness.
J. Comput. Secur., 2004

Privacy-enhancing identity management.
Inf. Secur. Tech. Rep., 2004

Preface.
Int. J. Inf. Sec., 2004

The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
IACR Cryptol. ePrint Arch., 2004

Privacy-enabled Management of Customer Data.
IEEE Data Eng. Bull., 2004

A General Composition Theorem for Secure Reactive Systems.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Low-Level Ideal Signatures and General Integrity Idealization.
Proceedings of the Information Security, 7th International Conference, 2004

Justifying a Dolev-Yao Model Under Active Attacks.
Proceedings of the Foundations of Security Analysis and Design III, 2004

2003
Analysis of Liberty Single-Sign-on with Enabled Clients.
IEEE Internet Comput., 2003

Symmetric Authentication Within a Simulatable Cryptographic Library.
IACR Cryptol. ePrint Arch., 2003

A Universally Composable Cryptographic Library.
IACR Cryptol. ePrint Arch., 2003

Federated Identity-Management Protocols.
Proceedings of the Security Protocols, 2003

Amending P3P for Clearer Privacy Promises.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

A composable cryptographic library with nested operations.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Security in Business Process Engineering.
Proceedings of the Business Process Management, International Conference, 2003

2002
Privacy in browser-based attribute exchange.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Privacy-Enabled Services for Enterprises.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Polynomial Fairness and Liveness.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Secure password-based cipher suite for TLS.
ACM Trans. Inf. Syst. Secur., 2001

Die PERSEUS Systemarchitektur.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

Relating Cryptography and Cryptographic Protocols.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
Key Agreement in Dynamic Peer Groups.
IEEE Trans. Parallel Distributed Syst., 2000

Design, implementation, and deployment of the iKP secure electronic payment system.
IEEE J. Sel. Areas Commun., 2000

Optimistic fair exchange of digital signatures.
IEEE J. Sel. Areas Commun., 2000

A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
IACR Cryptol. ePrint Arch., 2000

Electronic Commerce.
Comput. Networks, 2000

State of the art in electronic payment systems.
Adv. Comput., 2000

Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000

Composition and integrity preservation of secure reactive systems.
Proceedings of the CCS 2000, 2000

1999
The SEMPER Framework for Secure Electronic Commerce.
Wirtschaftsinf., 1999

Cryptographic Security of Reactive Systems.
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999

Authenticating public terminals.
Comput. Networks, 1999

1998
How to Break Fraud-Detectable Key Recovery.
ACM SIGOPS Oper. Syst. Rev., 1998

Real-time mixes: a bandwidth-efficient anonymity protocol.
IEEE J. Sel. Areas Commun., 1998

Designing a Generic Payment Service.
IBM Syst. J., 1998

A Status Report on the SEMPER Framework for Secure Electronic Commerce.
Comput. Networks, 1998

Asynchronous Protocols for Optimistic Fair Exchange.
Proceedings of the Security and Privacy, 1998

Optimal Efficiency of Optimistic Contract Signing.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

CLIQUES: A New Approach to Group Key Agreement.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Optimistic Fair Exchange of Digital Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Strong Loss Tolerance of Electronic Coin Systems.
ACM Trans. Comput. Syst., 1997

Server-Supported Signatures.
J. Comput. Secur., 1997

Trusting Mobile User Devices and Security Modules.
Computer, 1997

Anonymous Fingerprinting.
Proceedings of the Advances in Cryptology, 1997

Asymmetric Fingerprinting for Larger Collusions.
Proceedings of the CCS '97, 1997

Optimistic Protocols for Fair Exchange.
Proceedings of the CCS '97, 1997

Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997

1996
Development of a Secure Electronic Marketplace for Europe.
Proceedings of the Computer Security, 1996

Diffie-Hellman Key Distribution Extended to Group Communication.
Proceedings of the CCS '96, 1996

1995
Refinement and Extension of Encrypted Key Exchange.
ACM SIGOPS Oper. Syst. Rev., 1995

Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995

iKP - A Family of Secure Electronic Payment Protocols.
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995

How to Break Another Provably Secure Payment System.
Proceedings of the Advances in Cryptology, 1995

1994

1992
Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler.
PhD thesis, 1992

Unconditional Byzantine Agreement for any Number of Faulty Processors.
Proceedings of the STACS 92, 1992

Attacks on Protocols for Server-Aided RSA Computation.
Proceedings of the Advances in Cryptology, 1992

1991
Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit.
Proceedings of the VIS'91, 1991

Fail-stop-Signaturen und ihre Anwendung.
Proceedings of the VIS'91, 1991

Unconditional Byzantine Agreement with Good Majority.
Proceedings of the STACS 91, 1991

ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead.
Proceedings of the Kommunikation in Verteilten Systemen, 1991

How To Break and Repair A "Provably Secure" Untraceable Payment System.
Proceedings of the Advances in Cryptology, 1991

1990
Loss-tolerance for electronic wallets.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

A Remark on a Signature Scheme Where Forgery Can Be Proved.
Proceedings of the Advances in Cryptology, 1990

1989
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract).
Proceedings of the Advances in Cryptology, 1989

Unconditional Sender and Recipient Untraceability in Spite of Active Attacks.
Proceedings of the Advances in Cryptology, 1989

1988
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
Prax. Inf.verarb. Kommun., 1988

Datenschutz garantierende offene Kommunikationsnetze.
Inform. Spektrum, 1988

1987
Networks without user observability.
Comput. Secur., 1987

Verlusttolerante elektronische Brieftaschen.
Proceedings of the Fehlertolerierende Rechensysteme / Fault-Tolerant Computing Systems, 1987

1985
Networks Without User Observability: Design Options.
Proceedings of the Advances in Cryptology, 1985

Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen.
Proceedings of the Datenschutz und Datensicherung im Wandel der Informationstechnologien, 1985


  Loading...