A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams

X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …

Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization

R Holz, J Hiller, J Amann, A Razaghpanah… - ACM SIGCOMM …, 2020 - dl.acm.org
Transport Layer Security (TLS) 1.3 is a redesign of the Web's most important security
protocol. It was standardized in August 2018 after a four year-long, unprecedented design …

TLS 1.3 in practice: How TLS 1.3 contributes to the internet

H Lee, D Kim, Y Kwon - Proceedings of the Web Conference 2021, 2021 - dl.acm.org
Transport Layer Security (TLS) has become the norm for secure communication over the
Internet. In August 2018, TLS 1.3, the latest version of TLS, was approved, providing …

Certificate transparency in the wild: Exploring the reliability of monitors

B Li, J Lin, F Li, Q Wang, Q Li, J **g… - Proceedings of the 2019 …, 2019 - dl.acm.org
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …

Hammurabi: A framework for pluggable, logic-based X. 509 certificate validation policies

J Larisch, W Aqeel, M Lum, Y Goldschlag… - Proceedings of the …, 2022 - dl.acm.org
This paper proposes using a logic programming language to disentangle X. 509 certificate
validation policy from mechanism. Expressing validation policies in a logic programming …

Automatic detection of fake key attacks in secure messaging

TK Yadav, D Gosain, A Herzberg, D Zappala… - Proceedings of the …, 2022 - dl.acm.org
Popular instant messaging applications such as WhatsApp and Signal provide end-to-end
encryption for billions of users. These applications often rely on a centralized, application …

Certifiably vulnerable: Using certificate transparency logs for target reconnaissance

S Pletinckx, TD Nguyen, T Fiebig… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The Web PKI ecosystem provides an underlying layer of security to many Internet protocols
used today. By relying on Certificate Authorities (CAs), communication can be authenticated …

SoK: Log based transparency enhancing technologies

A Hicks - arxiv preprint arxiv:2305.01378, 2023 - arxiv.org
This paper systematizes log based Transparency Enhancing Technologies. Based on work
on transparency from multiple disciplines we outline the purpose, usefulness, and pitfalls of …