Refereed papers and works

Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More), A. Klein, 2021;
42nd IEEE Symposium on Security and Privacy (S&P), May 2021 (paper, preprint paper, bibtex).
POSTER: Black-box caches fingerprinting, A. Klein, E. Heftrig, H. Shulman, M. Waidner, 2020; The 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), November 2020 (paper, bibtex).
Flaw Label: Exploiting IPv6 Flow Label, J. Berger, A. Klein and B. Pinkas, 2020;
From IP ID to Device ID and KASLR Bypass, A. Klein and B. Pinkas, 2019;
DNS Cache-Based User Tracking, A. Klein and B. Pinkas, 2019.
Domain Validation++ For MitM-Resilient PKI, M. Brandt, T. Dai, A. Klein, H. Shulman and M. Waidner. 
ACM CCS 2018, Toronto, Canada, October 15-19, 2018 (bibtex, paper).
POSTER: X-Ray Your DNS, A. Klein, V. Kravtsov, A. Perlmuter, H. Shulman and M. Waidner. 
ACM CCS 2017, Dallas, TX, USA, October 30-November 3, 2017 (bibtex, short paper).
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet, A. Klein, H. Shulman and M. Waidner, 2017.
Internet-Wide Study of DNS Cache Injections, A. Klein, H. Shulman and M. Waidner, 2017.
IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, May 1-4, 2017 (bibtex). Won the Best in Session award (for the Internet Security II session).
A Perfecto Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software,  Y. Kesten, A. Klein, A. Pnueli and G. Raanan, 1999.
FM'99 - Formal Methods: World Congress on Formal Methods in the Development of Computing Systems Toulouse, France, September 20-24, 1999 Proceedings, Volume I (paperbibtex). 

Program committees

Paper Competition Referee, CSAW'18 Israel, 2018.

Program committee member, "Security, privacy, trust and abuse" track, WWW2012, 2012.

Program committee member, WOOT'11 (5th USENIX Workshop on Offensive Technologies), 2011.



Wrote the entry for "web cache poisoning attacks" in the Encyclopedia of Cryptography and Security