Vandal: A scalable security analysis framework for smart contracts L Brent, A Jurisevic, M Kong, E Liu, F Gauthier, V Gramoli, R Holz, ... arXiv preprint arXiv:1809.03981, 2018 | 325 | 2018 |
The SSL landscape: a thorough analysis of the x. 509 PKI using active and passive measurements R Holz, L Braun, N Kammenhuber, G Carle Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 298 | 2011 |
On availability for blockchain-based systems I Weber, V Gramoli, A Ponomarev, M Staples, R Holz, AB Tran, P Rimba 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 64-73, 2017 | 207 | 2017 |
P. Saint-Andre," Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Y Sheffer, R Holz BCP 195, RFC 7525, DOI 10.17487/RFC7525, May 2015,< http://www. rfc-editor …, 2015 | 197* | 2015 |
Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis Q Grundy, K Chiu, F Held, A Continella, L Bero, R Holz bmj 364, 2019 | 174 | 2019 |
Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS) Y Sheffer, R Holz, P Saint-Andre | 143 | 2015 |
Mission accomplished? HTTPS security after DigiNotar J Amann, O Gasser, Q Scheitle, L Brent, G Carle, R Holz Proceedings of the 2017 Internet Measurement Conference, 325-340, 2017 | 131 | 2017 |
TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication R Holz, J Amann, O Mehani, M Wachs, MA Kaafar Network and Distributed System Security Symposium (NDSS), 2016 | 126 | 2016 |
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization R Holz, J Hiller, J Amann, A Razaghpanah, T Jost, N Vallina-Rodriguez, ... ACM SIGCOMM Computer Communication Review 50 (3), 3-15, 2020 | 83* | 2020 |
The rise of certificate transparency and its implications on the internet ecosystem Q Scheitle, O Gasser, T Nolte, J Amann, L Brent, G Carle, R Holz, ... Proceedings of the Internet Measurement Conference 2018, 343-349, 2018 | 82 | 2018 |
New kids on the block: an analysis of modern blockchains L Anderson, R Holz, A Ponomarev, P Rimba, I Weber arXiv preprint arXiv:1606.06530, 2016 | 82 | 2016 |
X. 509 forensics: Detecting and localising the SSL/TLS men-in-the-middle R Holz, T Riedmaier, N Kammenhuber, G Carle Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 78 | 2012 |
Securing a deployment pipeline L Bass, R Holz, P Rimba, AB Tran, L Zhu 2015 IEEE/ACM 3rd International Workshop on Release Engineering, 4-7, 2015 | 74 | 2015 |
Investigating the OpenPGP web of trust A Ulrich, R Holz, P Hauck, G Carle Computer Security–ESORICS 2011, 489-507, 2011 | 65 | 2011 |
HEAP: reliable assessment of BGP hijacking attacks J Schlamp, R Holz, Q Jacquemart, G Carle, EW Biersack IEEE Journal on Selected Areas in Communications 34 (6), 1849-1861, 2016 | 64 | 2016 |
On the origin of scanning: The impact of location on internet-wide scans G Wan, L Izhikevich, D Adrian, K Yoshioka, R Holz, C Rossow, ... Proceedings of the ACM Internet Measurement Conference, 662-679, 2020 | 53 | 2020 |
A first look at certification authority authorization (CAA) Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ... ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018 | 53 | 2018 |
A responsible internet to increase trust in the digital world C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ... Journal of Network and Systems Management 28, 882-922, 2020 | 46 | 2020 |
In log we trust: Revealing poor security practices with certificate transparency logs and internet measurements O Gasser, B Hof, M Helm, M Korczynski, R Holz, G Carle Passive and Active Measurement: 19th International Conference, PAM 2018 …, 2018 | 43 | 2018 |
A deeper understanding of SSH: Results from Internet-wide scans O Gasser, R Holz, G Carle 2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014 | 42 | 2014 |