A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
Transport Layer Security (TLS) 1.3 is a redesign of the Web's most important security
protocol. It was standardized in August 2018 after a four year-long, unprecedented design …
protocol. It was standardized in August 2018 after a four year-long, unprecedented design …
TLS 1.3 in practice: How TLS 1.3 contributes to the internet
Transport Layer Security (TLS) has become the norm for secure communication over the
Internet. In August 2018, TLS 1.3, the latest version of TLS, was approved, providing …
Internet. In August 2018, TLS 1.3, the latest version of TLS, was approved, providing …
Certificate transparency in the wild: Exploring the reliability of monitors
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
Hammurabi: A framework for pluggable, logic-based X. 509 certificate validation policies
This paper proposes using a logic programming language to disentangle X. 509 certificate
validation policy from mechanism. Expressing validation policies in a logic programming …
validation policy from mechanism. Expressing validation policies in a logic programming …
Automatic detection of fake key attacks in secure messaging
Popular instant messaging applications such as WhatsApp and Signal provide end-to-end
encryption for billions of users. These applications often rely on a centralized, application …
encryption for billions of users. These applications often rely on a centralized, application …
Certifiably vulnerable: Using certificate transparency logs for target reconnaissance
The Web PKI ecosystem provides an underlying layer of security to many Internet protocols
used today. By relying on Certificate Authorities (CAs), communication can be authenticated …
used today. By relying on Certificate Authorities (CAs), communication can be authenticated …
SoK: Log based transparency enhancing technologies
A Hicks - arxiv preprint arxiv:2305.01378, 2023 - arxiv.org
This paper systematizes log based Transparency Enhancing Technologies. Based on work
on transparency from multiple disciplines we outline the purpose, usefulness, and pitfalls of …
on transparency from multiple disciplines we outline the purpose, usefulness, and pitfalls of …