S3 - Privacy-Preserving Access and Verifiable Utilization

S3 – Privacy-Preserving Access and Verifiable Utilization

This project addresses two central challenges in the provision of cloud services: (1) client privacy, and (2) verifiable metering and billing. For challenge (1), we design and develop anonymous communication mechanisms for the cloud. For challenge (2), we build techniques for service verification and design an infrastructure for verifiable metering and billing, enabling clients to verify in real-time their service consumption and corresponding charges. By solving and combining both challenges we obtain privacy-preserving verifiable metering and billing.

Researchers

Markus Brandt
Security in Information Technology

Research Interests:

  • Network Security
  • Secure Communication
  • Machine Learning
  • Web Security
  • Internet Protocols

Tianxiang Dai
Security in Information Technology

Tomas Hlavacek
Security in Information Technology

Research Interests:

  • Internet routing system security
  • Security and efficiency of large networks
  • De-centralized security protocols

Publications

Brand, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Domain Validation ++ for MitM-Resilient PKI.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: ACM CCS 2018, 15.-19.10. 2018, Toronto, Canada.
[Conference or workshop item] , (2018)

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Practical Experience: Methodologies for Measuring Route Origin Validation.
[Online-Edition: http://dsn2017.github.io/]
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, 26.-29.06.2018, Denver,CO,USA.
[Conference or workshop item] , (2018)

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael :
Path MTU Discovery Considered Harmful.
[Online-Edition: http://icdcs2018.ocg.at]
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, 2.-5.7.2018, Vienna, Austria.
[Conference or workshop item] , (2018)

Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference or workshop item] , (2017)

Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Internet-Wide Study of DNS Cache Injections.
IEEE International Conference on Computer Communications (INFOCOM)
[Conference or workshop item] , (2017)

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya :
Are We There Yet? On RPKIs Deployment and Security.
Network and Distributed Systems Security (NDSS)
[Conference or workshop item] , (2017)

Shulman, Haya ; Waidner, Michael :
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 27.-29.03. 2017, Boston, MA, USA. Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation USENIX Association
[Conference or workshop item] , (2017)

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya :
Obfuscation Combiners.
International Cryptology Conference (CRYPTO)
[Conference or workshop item] , (2016)

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens :
NetCo: Reliable Routing with Unreliable Routers.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Conference or workshop item] , (2016)

Shulman, Haya ; Waidner, Michael :
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In Traffic Monitoring and Analysis (TMA)
[Conference or workshop item] , (2016)

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; van Royeen, Carel :
Detection and Forensics of Domains Hijacking.
IEEE Global Communications Conference IEEE
[Conference or workshop item] , (2015)

Shulman, Haya ; Waidner, Michael :
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security (16) S. 14.
[Article] , (2015)

Shulman, Haya ; Waidner, Michael :
Towards Security of Internet's Naming Infrastructure.
Computer Security ESORICS
[Conference or workshop item] , (2015)

Herzberg, Amir ; Shulman, Haya :
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE (19) S. 80-84.
[Article] , (2015)

Herzberg, Amir ; Shulman, Haya :
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC .
[Conference or workshop item] , (2014)

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno :
Less is More: Cipher-Suite Negotiation for DNSSEC.
Computer Security Applications Conference (ACM ACSAC) ACSAC, IEEE
[Conference or workshop item] , (2014)

Shulman, Haya ; Ezra, Shiran :
Poster: On the Resilience of DNS Infrastructure.
ACM Conference on Computer and Communications Security (ACM CCS) ACM
[Conference or workshop item] , (2014)

Herzberg, Amir ; Shulman, Haya :
DNS Security: Past, Present and Future.
Future Security Conference 2014
[Conference or workshop item] , (2014)

Shulman, Haya :
Pretty Bad Privacy: Pitfalls of DNS Encryption.
Proceedings of the 13th annual ACM workshop on Privacy in the electronic society
[Conference or workshop item] , (2014)

go to TU-biblio search on ULB website