Back to Home

Selected Publications

Our group's seminal publications lay the foundation for Crosslayer Labs.

Our Research Impact

Our research has improved how every HTTPS certificate is issued and is required to be used by all publicly-trusted Certificate Authorities though an industry standard our team wrote. This secures the issuance of ~8 million digital certificates each day.

Bamboozling Certificate Authorities with BGP
Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal
2018

27th USENIX Security Symposium (USENIX Security 18)

This paper identifies a powerful attack where an adversary leverages vulnerabilities in BGP to gain publicly-trusted TLS certificates. This attack can lead to the impersonation of HTTPS websites and was later exploited to steal millions in cryptocurrency. This paper also introduced the countermeasure that is now known as Multi-Perspective Issuance Corroboration (MPIC) and protects the issuance of all digital certificates today.
Network Security
Interdomain Routing
Web PKI
How Effective is Multiple-Vantage-Point Domain Control Validation?
Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal
2023

32nd USENIX Security Symposium (USENIX Security 23)

This paper analyses the vulnerability of millions of HTTPS domains to cross-layer attacks using a real-time global infrastructure. The paper presents insights from advanced BGP attack simulations and geographically-distributed full-graph DNS lookups from millions of domains from Let's Encrypt logs.
Network Security
DNS
Web PKI
Border Gateway Protocol (BGP)
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt
Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal
2021

30th USENIX Security Symposium (USENIX Security 21)

This paper details the deployment of Multi-Vantage-Point Domain Validation (now known as MPIC) at Let's Encrypt, the world's highest-volume web PKI CA. The innovations presented in this paper established the groundwork that allowed the entire industry to use MPIC later on.
Network Security
Web PKI
Let's Encrypt
SICO: Surgical Interception Attacks by Manipulating BGP Communities
Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal
2019

Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security

This paper outlines a cutting-edge network attack that can affect critical network resources like Tor nodes or HTTPS while evading detection by state of the art monitoring. This paper also discusses countermeasures for the networking community to help protect against those attacks.
Network Security
Interdomain Routing
Border Gateway Protocol (BGP)
Creating a Secure Underlay for the Internet
Henry Birge-Lee, Joel Wanner, Grace H. Cimaszewski, Jonghoon Kwon, Liang Wang, François Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun
2022

31st USENIX Security Symposium (USENIX Security 22)

This paper leverages the security of the SCION next generation Internet architecture to provide improved routing security and protect core systems against cyber attacks. The paper uses the federated SCION network as an underlay to securely carry Internet traffic as close to its destination as possible.
Network Security
Interdomain Routing
SCION
Border Gateway Protocol (BGP)

Learn more about our research

Check out the research pages of some of our members like Prateek Mittal and Henry Birge-Lee. Feel free to get in touch with [email protected].