Ralph Holz
Ralph Holz
Verified email at utwente.nl - Homepage
Cited by
Cited by
The SSL landscape: a thorough analysis of the x. 509 PKI using active and passive measurements
R Holz, L Braun, N Kammenhuber, G Carle
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
P. Saint-Andre," Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
Y Sheffer, R Holz
BCP 195, RFC 7525, DOI 10.17487/RFC7525, May 2015,< http://www. rfc-editor …, 2015
Vandal: A scalable security analysis framework for smart contracts
L Brent, A Jurisevic, M Kong, E Liu, F Gauthier, V Gramoli, R Holz, ...
arXiv preprint arXiv:1809.03981, 2018
On availability for blockchain-based systems
I Weber, V Gramoli, A Ponomarev, M Staples, R Holz, AB Tran, P Rimba
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 64-73, 2017
Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS)
Y Sheffer, R Holz, P Saint-Andre
Internet Engineering Task Force Request for Comments 7457, 2015
TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication
R Holz, J Amann, O Mehani, M Wachs, MA Kaafar
Network and Distributed System Security Symposium (NDSS), 2016
Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis
Q Grundy, K Chiu, F Held, A Continella, L Bero, R Holz
bmj 364, 2019
Mission accomplished? HTTPS security after DigiNotar
J Amann, O Gasser, Q Scheitle, L Brent, G Carle, R Holz
Proceedings of the 2017 Internet Measurement Conference, 325-340, 2017
X. 509 forensics: Detecting and localising the SSL/TLS men-in-the-middle
R Holz, T Riedmaier, N Kammenhuber, G Carle
european symposium on research in computer security, 217-234, 2012
New kids on the block: an analysis of modern blockchains
L Anderson, R Holz, A Ponomarev, P Rimba, I Weber
arXiv preprint arXiv:1606.06530, 2016
Securing a deployment pipeline
L Bass, R Holz, P Rimba, AB Tran, L Zhu
2015 IEEE/ACM 3rd International Workshop on Release Engineering, 4-7, 2015
Investigating the OpenPGP web of trust
A Ulrich, R Holz, P Hauck, G Carle
Computer Security–ESORICS 2011, 489-507, 2011
The rise of Certificate Transparency and its implications on the Internet ecosystem
Q Scheitle, O Gasser, T Nolte, J Amann, L Brent, G Carle, R Holz, ...
Proceedings of the Internet Measurement Conference 2018, 343-349, 2018
A first look at certification authority authorization (caa)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
HEAP: reliable assessment of BGP hijacking attacks
J Schlamp, R Holz, Q Jacquemart, G Carle, EW Biersack
IEEE Journal on Selected Areas in Communications 34 (6), 1849-1861, 2016
A deeper understanding of SSH: Results from Internet-wide scans
O Gasser, R Holz, G Carle
2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
R Holz, J Hiller, J Amann, A Razaghpanah, T Jost, N Vallina-Rodriguez, ...
ACM SIGCOMM Computer Communication Review 50 (3), 3-15, 2020
Automated analysis of secure internet of things protocols
JY Kim, R Holz, W Hu, S Jha
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
An early look at multipath TCP deployment in the wild
O Mehani, R Holz, S Ferlin, R Boreli
Proceedings of the 6th international workshop on hot topics in planet-scale …, 2015
Spontaneous Virtual Networks: On the Road Towards the Internet's Next Generation
OP Waldhorst, C Blankenhorn, D Haage, R Holz, GG Koch, B Koldehofe, ...
IT-Information Technology 50 (6), 367, 2010
The system can't perform the operation now. Try again later.
Articles 1–20