ReACKed QUICer: Measuring the Performance of Instant Acknowledgments in QUIC Handshakes J Mücke, M Nawrocki, R Hiesgen, TC Schmidt, M Wählisch Proc. of IMC 2024, 2024 | | 2024 |
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments R Hiesgen, M Nawrocki, M Barcellos, D Kopp, O Hohlfeld, E Chan, ... Proc. of IMC 2024, 2024 | | 2024 |
Securing Name Resolution in the IoT: DNS over CoAP MS Lenders, C Amsüss, C Gündogan, M Nawrocki, TC Schmidt, ... Proc. of CoNEXT 2023, 2023 | 7 | 2023 |
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots M Nawrocki, J Kristoff, R Hiesgen, C Kanich, TC Schmidt, M Wählisch Proc. of Euro S&P 2023, 2023 | 8 | 2023 |
On the Interplay between TLS Certificates and QUIC Performance M Nawrocki, PF Tehrani, R Hiesgen, J Mücke, TC Schmidt, M Wählisch Proc. of CoNEXT 2022, 2022 | 19 | 2022 |
Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments J Mücke, M Nawrocki, R Hiesgen, P Sattler, J Zirngibl, G Carle, ... arXiv preprint arXiv:2209.00965, 2022 | 6 | 2022 |
Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope R Hiesgen, M Nawrocki, A King, A Dainotti, TC Schmidt, M Wählisch Proc. of USENIX Sec 2022, 2022 | 38 | 2022 |
The Race to the Vulnerable: Measuring the Log4j Shell Incident R Hiesgen, M Nawrocki, TC Schmidt, M Wählisch Proc. of TMA 2022, 2022 | 68* | 2022 |
Transparent Forwarders: An Unnoticed Component of the Open DNS Infrastructure M Nawrocki, M Koch, TC Schmidt, M Wählisch Proc. of CoNEXT 2021, 2021 | 22 | 2021 |
The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core M Nawrocki, M Jonker, TC Schmidt, M Wählisch Proc. of IMC 2021, 2021 | 30 | 2021 |
QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events M Nawrocki, R Hiesgen, TC Schmidt, M Wählisch Proc. of IMC 2021, 2021 | 27 | 2021 |
Uncovering Vulnerable Industrial Control Systems from the Internet Core M Nawrocki, TC Schmidt, M Wählisch Proc. of NOMS 2020, 2020 | 54* | 2020 |
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs M Nawrocki, J Blendin, C Dietzel, TC Schmidt, M Wählisch Proc. of IMC 2019, 2019 | 43 | 2019 |
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP N Hinze, M Nawrocki, M Jonker, A Dainotti, TC Schmidt, M Wählisch Proc. of SIGCOMM 2018 Posters & Demos, 2018 | 21 | 2018 |
Towards Distributed Threat Intelligence in Real-Time P Meyer, R Hiesgen, TC Schmidt, M Nawrocki, M Wählisch Proc. of SIGCOMM 2017 Posters & Demos, 2017 | 2 | 2017 |
A Survey on Honeypot Software and Data Analysis M Nawrocki, M Wählisch, TC Schmidt, C Keil, J Schönfelder arXiv preprint arXiv:1608.06249, 2016 | 248 | 2016 |
Design, Implementation, and Operation of a Mobile Honeypot M Wählisch, A Vorbach, C Keil, J Schönfelder, TC Schmidt, JH Schiller arXiv preprint arXiv:1301.7257, 2013 | 36 | 2013 |