Publications

[1]
Benedikt Westermann, Lars Fischer, Vinh Pham, Dogan Kesdogan. 50 Bucks Attack on Tor (Short Paper). In the preproceedings of the 16th Nordic Conference in Secure IT Systems (NordSec), Oct 2011.
[2]
Benedikt Westermann, Pern Hui Chia, and Dogan Kesdogan. Analyzing the Gold Star Scheme in a Split Tor Network. To appear in the proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), Sep 2011. [.pdf ]
[3]
Benedikt Westermann and Dogan Kesdogan. Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. To appear in the proceedings of Financial Cryptography and Data Security 2011, Feb 2011. [.pdf ]
[4]
Benedikt Westermann, Danilo Gligoroski, and Svein Knapskog. Comparison of the power consumption of the 2nd round sha-3 candidates. In Proceedings of the ICT Innovations 2010. Springer, September 2010. [ .pdf ]
[5]
Benedikt Westermann and Dogan Kesdogan. Introducing perfect forward secrecy for AN.ON. In Finn Arve Aagesen and Svein J. Knapskog, editors, EUNICE, volume 6164 of Lecture Notes in Computer Science, pages 132-142. Springer, June 2010. [ DOI | .pdf ]
[6]
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidis, and Dogan Kesdogan. Cryptographic protocol analysis of AN.ON. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 114-128. Springer, January 2010. [ DOI | .pdf ]
[7]
Benedikt Westermann. Security analysis of AN.ON’s payment scheme. In Audun Jøsang, Torleiv Maseng, and Svein J. Knapskog, editors, NordSec, volume 5838 of Lecture Notes in Computer Science, pages 255-270. Springer, October 2009. [ DOI | .pdf ]
[8]
Andriy Panchenko, Benedikt Westermann, Lexi Pimenidis, and Christer Andersson. Shalon: Lightweight anonymization based on open standards. In Proceedings of 18th Internatonal Conference on Computer Communications and Networks, San Francisco, CA, USA, August 2009. [ DOI | .pdf ]
[9]
Benedikt Westermann, Andriy Panchenko, and Lexi Pimenidis. A kademlia-based node lookup system for anonymization networks. In Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-Hoon Kim, and Sang-Soo Yeo, editors, ISA, volume 5576 of Lecture Notes in Computer Science, pages 179-189. Springer, June 2009. [ DOI | .pdf ]
[10]
Dhiah el Diehn I. Abou-Tair, Lexi Pimenidis, Jens Schomburg, and Benedikt Westermann. Usability inspection of anonymity networks. Privacy, Security, Trust and the Management of e-Business, World Congress on, 0:100-109, 2009. [ DOI ]
[ 11]
Lexi Pimenidis, Volker Wetzelaer, and Benedikt Westermann. A context aware network-ids. In Proceedings of the 13th Nordic Workshop on Secure IT Systems, 2008.
[12]
Benedikt Westermann. Ein einfaches Anonymisierungsverfahren basierend auf offenen Standards. In Informatiktage, pages 231-233, 2008.
[13]
Benedikt Westermann. Entwicklung und Evaluation eines einfachen und effizienten Anonymisierungsverfahrens basierend auf offenen Standards. Master’s thesis, RWTH Aachen, January 2008. [ .pdf ]

Presentation