Publications

Book

[2]SCION: A Secure Internet Architecture (Open Access PDF)
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk and Laurent Chuat.
2017
[1]SCION: A Secure Internet Architecture (Springer)
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk and Laurent Chuat.
Publisher: Springer International Publishing AG, 2017. [doi]

Networking

2021
[10]Global Distributed Secure Mapping of Network Addresses
Supraja Sridhara, François Wirz, Joeri de Ruiter, Caspar Schutijser, Markus Legner and Adrian Perrig.
In Proceedings of the ACM SIGCOMM Workshop on Technologies, Applications, and Uses of a Responsible Internet (TAURIN), August 2021.
[9]Formal Verification of Secure Forwarding Protocols
Tobias Klenze, Christoph Sprenger and David Basin.
In Proceedings of the 34th IEEE Computer Security Foundations (CSF) Symposium, June 2021.
2020
[8]EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger and Adrian Perrig.
In Proceedings of the 29th USENIX Security Symposium, August 2020.
[7]The Value of Information in Selfish Routing
Simon Scherrer, Adrian Perrig and Stefan Schmid.
In Proceedings of the 27th International Colloquium on Structural Information and Communication Complexity (SIROCCO), June 2020.
2017
[6]The SCION Internet Architecture
David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk and Pawel Szalachowski.
In Communications of the ACM 60 (6), June 2017. (Preprint) [doi]
[5]Deadline-Aware Multipath Communication: An Optimization Problem
Laurent Chuat, Adrian Perrig and Yih-Chun Hu.
In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2017.
2016
[4]Modeling Data-Plane Power Consumption of Future Internet Architectures
Chen Chen, David Barrera and Adrian Perrig.
In Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC), November 2016.
2015
[3]SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks
David Barrera, Raphael M. Reischuk, Pawel Szalachowski and Adrian Perrig.
In arXiv e-prints, August 2015.
[2]Source-Based Path Selection: The Data Plane Perspective
Taeho Lee, Christos Pappas, Cristina Basescu, Jun Han, Torsten Hoefler and Adrian Perrig.
In Proceedings of the ACM Conference on Future Internet Technologies (CFI), June 2015.
2011
[1]SCION: Scalability, Control, and Isolation On Next-Generation Networks
Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig and David G. Andersen.
In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2011.

Accountability

2015
[2]FAIR: Forwarding Accountability for Internet Reputability
Christos Pappas, Raphael M. Reischuk and Adrian Perrig.
In Proceedings of the IEEE International Conference on Network Protocols (ICNP), November 2015.
[1]Forwarding Accountability: A Challenging Necessity of the Future Data Plane
Christos Pappas, Raphael M. Reischuk and Adrian Perrig.
In Proceedings of the IFIP WG 11.4 Workshop on Open Research Problems in Network Security (iNetSec), October 2015.

Authentication / Public-Key Infrastructure

2020
[10]SVLAN: Secure & Scalable Network Virtualization
Jonghoon Kwon, Taeho Lee, Claude Hähni and Adrian Perrig.
In Proceedings of the Symposium on Network and Distributed System Security (NDSS), 2020. [doi]
2017
[9]Internet Kill Switches Demystified
Benjamin Rothenberger, Daniele E. Asoni, David Barrera and Adrian Perrig.
In Proceedings of the European Workshop on Systems Security (EuroSec), April 2017.
2016
[8]CASTLE: CA Signing in a Touch-Less Environment
Stephanos Matsumoto, Samuel Steffen and Adrian Perrig.
In Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2016.
[7]Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure
David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse and Pawel Szalachowski.
In IEEE Transactions on Dependable and Secure Computing (TDSC), October 2016.
[6]PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem
Pawel Szalachowski, Laurent Chuat and Adrian Perrig.
In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P), March 2016.
2015
[5]Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs
Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie and Eran Messeri.
In Proceedings of the IEEE Conference on Communications and Network Security (CNS), September 2015.
2014
[4]ARPKI: Attack Resilient Public-Key Infrastructure
David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse and Pawel Szalachowski.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2014.
[3]PoliCert: Secure and Flexible TLS Certificate Management
Pawel Szalachowski, Stephanos Matsumoto and Adrian Perrig.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2014.
[2]Mechanized Network Origin and Path Authenticity Proofs
Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim and Yih-Chun Hu and Adrian Perrig.
In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), November 2014.
[1]Lightweight Source Authentication and Path Validation
Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu and Adrian Perrig.
In Proceedings of the ACM SIGCOMM Conference, August 2014.

Privacy and Anonymity

2017
[5]PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer
Chen Chen and Adrian Perrig.
In Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017.
2016
[4]Source Accountability with Domain-brokered Privacy
Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski and Adrian Perrig.
In Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT), December 2016.
[3]Communication Based on Per-Packet One-Time Addresses
Taeho Lee, Christos Pappas, Pawel Szalachowski and Adrian Perrig.
In Proceedings of the IEEE Conference on Network Protocols (ICNP), November 2016.
2015
[2]On Building Onion Routing into Future Internet Architectures
Daniele E. Asoni, Chen Chen, David Barrera and Adrian Perrig.
In Proceedings of the IFIP WG 11.4 Workshop on Open Research Problems in Network Security (iNetSec), October 2015.
[1]HORNET: High-speed Onion Routing at the Network Layer
Chen Chen, Daniele E. Asoni, David Barrera, George Danezis and Adrian Perrig.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2015.

DDoS Defense

2020
[3]PISKES: Pragmatic Internet-Scale Key-Establishment System
Benjamin Rothenberger, Dominik Roos, Markus Legner and Adrian Perrig.
In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS'20), 2020.
2017
[2]The Case for In-Network Replay Suppression
Taeho Lee, Christos Pappas, Adrian Perrig, Virgil Gligor and Yih-Chun Hu.
In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), April 2017.
2016
[1]SIBRA: Scalable Internet Bandwidth Reservation Architecture
Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota and Jumpei Urakawa.
In Proceedings of the Symposium on Network and Distributed System Security (NDSS), February 2016.

Satellite Networks

2020
[1]Internet Backbones in Space
Giacomo Giuliari, Tobias Klenze, Markus Legner, David Basin, Adrian Perrig and Ankit Singla.
In SIGCOMM Comput. Commun. Rev. 50 (1), jan 2020.