SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements

L Jannett, C Mainka, M Westers… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …

Human factors in security research: Lessons learned from 2008-2018

M Kaur, M van Eeten, M Janssen, K Borgolte… - arxiv preprint arxiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …

Share First, Ask Later (or Never?) Studying Violations of {GDPR's} Explicit Consent in Android Apps

TT Nguyen, M Backes, N Marnau, B Stock - 30th USENIX Security …, 2021 - usenix.org
Since the General Data Protection Regulation (GDPR) went into effect in May 2018, online
services are required to obtain users' explicit consent before sharing users' personal data …

Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses

A Anwar, A Abusnaina, S Chen, F Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Vulnerability databases are vital sources of information on emergent software security
concerns. Security professionals, from system administrators to developers to researchers …

Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices

T Sasaki, A Fujita, CH Gañán… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Geographically distributed infrastructures, such as buildings, dams, and solar power plants,
are commonly maintained via Internet-connected remote management devices. Previous …

The leaky web: Automated discovery of cross-site information leaks in browsers and the web

J Rautenstrauch, G Pellegrino… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
When browsing the web, none of us want sites to infer which other sites we may have visited
before or are logged in to. However, attacker-controlled sites may infer this state through …

Pdiff: Semantic-based patch presence testing for downstream kernels

Z Jiang, Y Zhang, J Xu, Q Wen, Z Wang… - Proceedings of the …, 2020 - dl.acm.org
Open-source kernels have been adopted by massive downstream vendors on billions of
devices. However, these vendors often omit or delay the adoption of patches released in the …

Mentions of security vulnerabilities on reddit, twitter and github

S Horawalavithana, A Bhattacharjee, R Liu… - IEEE/WIC/ACM …, 2019 - dl.acm.org
Activity on social media is seen as a relevant sensor for different aspects of the society. In a
heavily digitized society, security vulnerabilities pose a significant threat that is publicly …

Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications

J Rack, CA Staicu - Proceedings of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
In recent years, we have seen an increased interest in studying the software supply chain of
user-facing applications to uncover problematic third-party dependencies. Prior work shows …

[PDF][PDF] From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.

C Lu, B Liu, Y Zhang, Z Li, F Zhang, H Duan, Y Liu… - NDSS, 2021 - utdallas.edu
When a domain is registered, information about the registrants and other related personnel
is recorded by WHOIS databases owned by registrars or registries (called WHOIS providers …