A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
Network measurements are an important tool in understanding the Internet. Due to the
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …
On landing and internal web pages: The strange case of jekyll and hyde in web performance measurement
There is a rich body of literature on measuring and optimizing nearly every aspect of the
web, including characterizing the structure and content of web pages, devising new …
web, including characterizing the structure and content of web pages, devising new …
The rise of certificate transparency and its implications on the internet ecosystem
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and
explore the implications of exposing certificate DNS names from the perspective of security …
explore the implications of exposing certificate DNS names from the perspective of security …
Easing the conscience with OPC UA: An internet-wide study on insecure deployments
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …
process automation, move closer and closer to the Internet, mandating secure …
Certificate transparency in the wild: Exploring the reliability of monitors
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …
Internet requires fundamental changes in security to uphold secure and safe operation …
COMAR: classification of compromised versus maliciously registered domains
Miscreants abuse thousands of domain names every day by launching large-scale attacks
such as phishing or malware campaigns. While some domains are solely registered for …
such as phishing or malware campaigns. While some domains are solely registered for …
Det: Enabling efficient probing of ipv6 active addresses
Fast IPv4 scanning significantly improves network measurement and security research.
Nevertheless, it is infeasible to perform brute-force scanning of the IPv6 address space …
Nevertheless, it is infeasible to perform brute-force scanning of the IPv6 address space …