SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
Human factors in security research: Lessons learned from 2008-2018
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
Share First, Ask Later (or Never?) Studying Violations of {GDPR's} Explicit Consent in Android Apps
Since the General Data Protection Regulation (GDPR) went into effect in May 2018, online
services are required to obtain users' explicit consent before sharing users' personal data …
services are required to obtain users' explicit consent before sharing users' personal data …
Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses
Vulnerability databases are vital sources of information on emergent software security
concerns. Security professionals, from system administrators to developers to researchers …
concerns. Security professionals, from system administrators to developers to researchers …
Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices
Geographically distributed infrastructures, such as buildings, dams, and solar power plants,
are commonly maintained via Internet-connected remote management devices. Previous …
are commonly maintained via Internet-connected remote management devices. Previous …
The leaky web: Automated discovery of cross-site information leaks in browsers and the web
When browsing the web, none of us want sites to infer which other sites we may have visited
before or are logged in to. However, attacker-controlled sites may infer this state through …
before or are logged in to. However, attacker-controlled sites may infer this state through …
Pdiff: Semantic-based patch presence testing for downstream kernels
Open-source kernels have been adopted by massive downstream vendors on billions of
devices. However, these vendors often omit or delay the adoption of patches released in the …
devices. However, these vendors often omit or delay the adoption of patches released in the …
Mentions of security vulnerabilities on reddit, twitter and github
Activity on social media is seen as a relevant sensor for different aspects of the society. In a
heavily digitized society, security vulnerabilities pose a significant threat that is publicly …
heavily digitized society, security vulnerabilities pose a significant threat that is publicly …
Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications
J Rack, CA Staicu - Proceedings of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
In recent years, we have seen an increased interest in studying the software supply chain of
user-facing applications to uncover problematic third-party dependencies. Prior work shows …
user-facing applications to uncover problematic third-party dependencies. Prior work shows …
[PDF][PDF] From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
When a domain is registered, information about the registrants and other related personnel
is recorded by WHOIS databases owned by registrars or registries (called WHOIS providers …
is recorded by WHOIS databases owned by registrars or registries (called WHOIS providers …