A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Security assessment and evaluation of VPNs: a comprehensive survey

H Abbas, N Emmanuel, MF Amjad, T Yaqoob… - ACM Computing …, 2023 - dl.acm.org
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to
provide confidentiality and anonymity to communication. Despite this enormous and …

Beyond google play: A large-scale comparative study of chinese android app markets

H Wang, Z Liu, J Liang, N Vallina-Rodriguez… - Proceedings of the …, 2018 - dl.acm.org
China is one of the largest Android markets in the world. As Chinese users cannot access
Google Play to buy and install Android apps, a number of independent app stores have …

Measuring the emergence of consent management on the web

M Hils, DW Woods, R Böhme - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Privacy laws like the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to …

A first look at privacy analysis of COVID-19 contact-tracing mobile applications

MA Azad, J Arshad, SMA Akmal, F Riaz… - IEEE internet of …, 2020 - ieeexplore.ieee.org
Today's smartphones are equipped with a large number of powerful value-added sensors
and features, such as a low-power Bluetooth sensor, powerful embedded sensors, such as …

Awareness, adoption, and misconceptions of web privacy tools

P Story, D Smullen, Y Yao, A Acquisti… - Proceedings on …, 2021 - petsymposium.org
Privacy and security tools can help users protect themselves online. Unfortunately, people
are often unaware of such tools, and have potentially harmful misconceptions about the …

An analysis of pre-installed android software

J Gamba, M Rashed, A Razaghpanah… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
The open-source nature of the Android OS makes it possible for manufacturers to ship
custom versions of the OS along with a set of pre-installed apps, often for product …

Studying TLS usage in Android apps

A Razaghpanah, AA Niaki… - Proceedings of the 13th …, 2017 - dl.acm.org
Transport Layer Security (TLS), has become the de-facto standard for secure Internet
communication. When used correctly, it provides secure data transfer, but used incorrectly, it …

Bug {Hunters'} Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem

O Akgul, T Eghtesad, A Elazari, O Gnawali… - 32nd USENIX Security …, 2023 - usenix.org
Although researchers have characterized the bug-bounty ecosystem from the point of view
of platforms and programs, minimal effort has been made to understand the perspectives of …

[PDF][PDF] VPNalyzer: systematic investigation of the VPN ecosystem

R Ramesh, L Evdokimov, D Xue, R Ensafi - Network and Distributed …, 2022 - diwenx.com
Use of Virtual Private Networks (VPNs) has been growing rapidly due to increased public
awareness of online risks to privacy and security. This growth has fueled the VPN ecosystem …