We will present the Peeroskop project at the booth of the Federal Ministry of Education and Research from 16 – 20 March, 2015 in Hannover, Germany. CeBIT is the world’s largest and most international computer expo. Details will follow soon.
We will present the Peeroskop project at the booth of the Federal Ministry of Education and Research from 16 – 20 March, 2015 in Hannover, Germany. CeBIT is the world’s largest and most international computer expo. Details will follow soon.
We will present our work about “Native Actors: How to Scale Network Forensics” at ACM SIGCOMM 2014. This is joint work with the group of Vern Paxson, UC Berkeley/ICSI on the scalable network forensics system VAST. Today’s network forensics require…
Our “Resource Public Key Infrastructure (RPKI) Router Implementation Report” has been published as RFC 7128. This is joint work with Randy Bush (IIJ), Rob Austein (Dragon Research Lab), Keyur Patel (Cisco), and Hannes Gredler (Juniper).
Matthias Wählisch has been invited to give a talk about RPKI at “Nationaler Provider-Workshop: Erfahrungsaustausch & Zusammenarbeit”, which is organized by the BSI.
We present a paper at the 6th Workshop on Cyber Security Experimentation and Test (CSET ’13) at USENIX Security 2013. Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller, RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin…
Matthias Wählisch gives a short talk at 20th Annual Network & Distributed System Security Symposium (NDSS) about RTRlib. Matthias Wählisch , Fabian Holler, Thomas C. Schmidt, Jochen Schiller: Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis,…
Johann Schlamp, Georg Carle, and Ernst W. Biersack, “A Forensic Case Study on AS Hijacking: The Attacker’s Perspective“, In: ACM Computer Communication Review (CCR), Vol. 43, No. 2, pp. 5-12, April 2013.
Lothar Braun will present at the first IMC Workshop on Internet Visualization (WIV 2012) . Lothar Braun, Mario Volke, Johann Schlamp, Alexander Klein, and Georg Carle, “Flow-inspector: A framework for visualizing network flow data using current web technologies”
We will present two posters at the ACM CoNEXT student workshop Johann Schlamp, Georg Carle, Ernst W. Biersack, “How to Prevent AS Hijacking Attacks“, In: Proc. of ACM CoNEXT. Student Workshop, New York:ACM, 2012. Sebastian Meyer, Matthias Wählisch, Thomas C.…
In the context of securing the Internet backbone, we present a poster at ACM SIGCOMM 2012 Matthias Wählisch, Olaf Maennel, Thomas C. Schmidt, Towards Detecting BGP Route Hijacking using the RPKI, In: Proc. of ACM SIGCOMM. Poster, New York:ACM, August…