Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From IP to transport and beyond: cross-layer attacks against applications., , , and . SIGCOMM, page 836-849. ACM, (2021)Security Implications of Insecure DNS Usage in the Internet.. Technical University of Darmstadt, Germany, (2022)Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS., and . USENIX Security Symposium, page 3165-3182. USENIX Association, (2021)Secure Consensus Generation with Distributed DoH., , and . DSN (Supplements), page 41-42. IEEE, (2020)Behind the Scenes of RPKI., , , , and . CCS, page 1413-1426. ACM, (2022)XDRI Attacks - and - How to Enhance Resilience of Residential Routers., , , and . CoRR, (2022)The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources., , , and . USENIX Security Symposium, page 3147-3164. USENIX Association, (2021)Stalloris: RPKI Downgrade Attack., , , , and . USENIX Security Symposium, page 4455-4471. USENIX Association, (2022)Beyond Limits: How to Disable Validators in Secure Networks., , , , and . SIGCOMM, page 950-966. ACM, (2023)Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP., , and . DSN (Supplements), page 49-50. IEEE, (2020)