Presentation at CeBIT 2015

We will present the Peeroskop project at the booth of the Federal Ministry of Education and Research from 16 – 20 March, 2015 in Hannover, Germany. CeBIT is the world’s largest and most international computer expo. Details will follow soon.

Posted in Uncategorized

Demo@ACM SIGCOMM 2014

We will present our work about “Native Actors: How to Scale Network Forensics” at ACM SIGCOMM 2014. This is joint work with the group of Vern Paxson, UC Berkeley/ICSI on the scalable network forensics system VAST. Today’s network forensics require

Posted in Uncategorized

RFC 7128 published

Our “Resource Public Key Infrastructure (RPKI) Router Implementation Report” has been published as RFC 7128. This is joint work with Randy Bush (IIJ), Rob Austein (Dragon Research Lab), Keyur Patel (Cisco), and Hannes Gredler (Juniper).

Posted in Uncategorized

Talk@BSI Workshop

Matthias Wählisch has been invited to give a talk about RPKI at “Nationaler Provider-Workshop: Erfahrungsaustausch & Zusammenarbeit”, which is organized by the BSI.

Posted in Uncategorized

Paper@CSET, USENIX Security 2013

We present a paper at the 6th Workshop on Cyber Security Experimentation and Test (CSET ’13) at USENIX Security 2013. Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller, RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin

Posted in Uncategorized

Presentation@ISOC NDSS 2013

Matthias Wählisch gives a short talk at 20th Annual Network & Distributed System Security Symposium (NDSS) about RTRlib. Matthias Wählisch , Fabian Holler, Thomas C. Schmidt, Jochen Schiller: Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis,

Posted in Uncategorized

Article in CCR published

Johann Schlamp, Georg Carle, and Ernst W. Biersack, “A Forensic Case Study on AS Hijacking: The Attacker’s Perspective“, In: ACM Computer Communication Review (CCR), Vol. 43, No. 2, pp. 5-12, April 2013.

Posted in Uncategorized

Paper@IMC WIV 2012

Lothar Braun will present at the first IMC Workshop on Internet Visualization (WIV 2012) . Lothar Braun, Mario Volke, Johann Schlamp, Alexander Klein, and Georg Carle, “Flow-inspector: A framework for visualizing network flow data using current web technologies”

Posted in Uncategorized

Two posters@ACM CoNEXT 2012

We will present two posters at the ACM CoNEXT student workshop Johann Schlamp, Georg Carle, Ernst W. Biersack, “How to Prevent AS Hijacking Attacks“, In: Proc. of ACM CoNEXT. Student Workshop, New York:ACM, 2012. Sebastian Meyer, Matthias Wählisch, Thomas C.

Posted in Uncategorized

Poster@SIGCOMM 2012

In the context of securing the Internet backbone, we present a poster at ACM SIGCOMM 2012 Matthias Wählisch, Olaf Maennel, Thomas C. Schmidt, Towards Detecting BGP Route Hijacking using the RPKI, In: Proc. of ACM SIGCOMM. Poster, New York:ACM, August

Posted in Uncategorized