default search action
Johanna Amann
Person information
- affiliation: International Computer Science Institute, Berkeley, CA, USA
- affiliation (PhD 2011): Technical University of Munich, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c26]Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer:
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring. SEC 2022: 87-105 - 2021
- [e2]Dave Levin, Alan Mislove, Johanna Amann, Matthew Luckie:
IMC '21: ACM Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021. ACM 2021, ISBN 978-1-4503-9129-0 [contents] - [i7]Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer:
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring. CoRR abs/2104.09828 (2021) - 2020
- [j1]Ralph Holz, Jens Hiller, Johanna Amann, Abbas Razaghpanah, Thomas Jost, Narseo Vallina-Rodriguez, Oliver Hohlfeld:
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. Comput. Commun. Rev. 50(3): 3-15 (2020) - [c25]Jens Hiller, Johanna Amann, Oliver Hohlfeld:
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. CCS 2020: 1289-1306 - [c24]Ralph Holz, Diego Perino, Matteo Varvello, Johanna Amann, Andrea Continella, Nate Evans, Ilias Leontiadis, Christopher Natoli, Quirin Scheitle:
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web. TMA 2020 - [i6]Ralph Holz, Diego Perino, Matteo Varvello, Johanna Amann, Andrea Continella, Nate Evans, Ilias Leontiadis, Christopher Natoli, Quirin Scheitle:
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web. CoRR abs/2004.13239 (2020) - [i5]Jens Hiller, Johanna Amann, Oliver Hohlfeld:
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures. CoRR abs/2009.08772 (2020)
2010 – 2019
- 2019
- [i4]Ralph Holz, Johanna Amann, Abbas Razaghpanah, Narseo Vallina-Rodriguez:
The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods. CoRR abs/1907.12762 (2019) - 2018
- [c23]Quirin Scheitle, Taejoong Chung, Johanna Amann, Oliver Gasser, Lexi Brent, Georg Carle, Ralph Holz, Jens Hiller, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, David R. Choffnes, Alan Mislove:
Measuring Adoption of Security Additions to the HTTPS Ecosystem. ANRW 2018: 1-2 - [c22]Abbas Razaghpanah, Arian Akhavan Niaki, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Johanna Amann, Phillipa Gill:
Studying TLS Usage in Android Apps. ANRW 2018: 5 - [c21]Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch:
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Internet Measurement Conference 2018: 343-349 - [c20]Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero:
Coming of Age: A Longitudinal Study of TLS Deployment. Internet Measurement Conference 2018: 415-428 - [i3]Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch:
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. CoRR abs/1809.08325 (2018) - 2017
- [c19]Johanna Amann, Robin Sommer:
Viable Protection of High-Performance Networks through Hardware/Software Co-Design. SDN-NFV@CODASPY 2017: 19-24 - [c18]Abbas Razaghpanah, Arian Akhavan Niaki, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Johanna Amann, Phillipa Gill:
Studying TLS Usage in Android Apps. CoNEXT 2017: 350-362 - [c17]Johanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, Ralph Holz:
Mission accomplished?: HTTPS security after diginotar. Internet Measurement Conference 2017: 325-340 - [e1]Mohamed Ali Kâafar, Steve Uhlig, Johanna Amann:
Passive and Active Measurement - 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings. Lecture Notes in Computer Science 10176, Springer 2017, ISBN 978-3-319-54327-7 [contents] - 2016
- [c16]Robin Sommer, Johanna Amann, Seth Hall:
Spicy: a unified deep packet inspection framework for safely dissecting all your data. ACSAC 2016: 558-569 - [c15]Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael D. Bailey, J. Alex Halderman:
Towards a Complete View of the Certificate Ecosystem. Internet Measurement Conference 2016: 543-549 - [c14]Ralph Holz, Johanna Amann, Olivier Mehani, Mohamed Ali Kâafar, Matthias Wachs:
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. NDSS 2016 - [c13]Johanna Amann, Robin Sommer:
Exploring Tor's Activity Through Long-Term Passive TLS Traffic Measurement. PAM 2016: 3-15 - [c12]Liang Zhu, Johanna Amann, John S. Heidemann:
Measuring the Latency and Pervasiveness of TLS Certificate Revocation. PAM 2016: 16-29 - [c11]Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl:
Specification Mining for Intrusion Detection in Networked Control Systems. USENIX Security Symposium 2016: 791-806 - 2015
- [c10]Johanna Amann, Robin Sommer:
Providing Dynamic Control to Passive Network Security Monitoring. RAID 2015: 133-152 - [i2]Ralph Holz, Johanna Amann, Olivier Mehani, Matthias Wachs, Mohamed Ali Kâafar:
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication. CoRR abs/1511.00341 (2015) - [i1]Johanna Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates. Tiny Trans. Comput. Sci. 3 (2015) - 2014
- [c9]Narseo Vallina-Rodriguez, Johanna Amann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Tangled Mass: The Android Root Certificate Stores. CoNEXT 2014: 141-148 - [c8]Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael D. Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:
The Matter of Heartbleed. Internet Measurement Conference 2014: 475-488 - [c7]Johanna Amann, Seth Hall, Robin Sommer:
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. RAID 2014: 320-340 - 2013
- [c6]B. Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
No attack necessary: the surprising dynamics of SSL trust relationships. ACSAC 2013: 179-188 - [c5]Devdatta Akhawe, B. Amann, Matthias Vallentin, Robin Sommer:
Here's my cert, so trust me, maybe?: understanding TLS errors on the web. WWW 2013: 59-70 - 2012
- [c4]B. Amann, Robin Sommer, Aashish Sharma, Seth Hall:
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. RAID 2012: 314-333 - 2011
- [b1]Johanna Amann:
Redundancy and access permissions in decentralized file systems. Technical University Munich, 2011, pp. 1-248 - 2010
- [c3]B. Amann, Thomas Fuhrmann:
Cryptographically Enforced Permissions for Fully Decentralized File Systems. Peer-to-Peer Computing 2010: 1-10 - [c2]Yaser Houri, B. Amann, Thomas Fuhrmann:
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems. SSS 2010: 519-530
2000 – 2009
- 2008
- [c1]B. Amann, Benedikt Elser, Yaser Houri, Thomas Fuhrmann:
IgorFs: A Distributed P2P File System. Peer-to-Peer Computing 2008: 77-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint