Predicting impending exposure to malicious content from user behavior

M Sharif, J Urakawa, N Christin, A Kubota… - Proceedings of the 2018 …, 2018 - dl.acm.org
Many computer-security defenses are reactive---they operate only when security incidents
take place, or immediately thereafter. Recent efforts have attempted to predict security …

Certificate transparency in the wild: Exploring the reliability of monitors

B Li, J Lin, F Li, Q Wang, Q Li, J **g… - Proceedings of the 2019 …, 2019 - dl.acm.org
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …

Replication: No one can hack my mind revisiting a study on expert and {Non-Expert} security practices and advice

K Busse, J Schäfer, M Smith - … on Usable Privacy and Security (SOUPS …, 2019 - usenix.org
A 2015 study by Iulia Ion, Rob Reeder, and Sunny Consolvo examined the self-reported
security behavior of security experts and non-experts. They also analyzed what kind of …

COMAR: classification of compromised versus maliciously registered domains

S Maroofi, M Korczyński, C Hesselman… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Miscreants abuse thousands of domain names every day by launching large-scale attacks
such as phishing or malware campaigns. While some domains are solely registered for …

A usability evaluation of Let's Encrypt and Certbot: usable security done right

C Tiefenau, E von Zezschwitz, M Häring… - Proceedings of the …, 2019 - dl.acm.org
The correct configuration of HTTPS is a complex set of tasks, which many administrators
have struggled with in the past. Let's Encrypt and Electronic Frontier Foundation's Certbot …

Cloud strife: mitigating the security risks of domain-validated certificates

K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna - 2018 - escholarship.org
Infrastructure-as-a-Service (IaaS), and more generally the" cloud," like Amazon Web
Services (AWS) or Microsoft Azure, have changed the landscape of system operations on …

DISCO: Sidestep** RPKI's deployment barriers

T Hlavacek, I Cunha, Y Gilad, A Herzberg… - … and Distributed System …, 2020 - par.nsf.gov
BGP is a ga** security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …

In log we trust: Revealing poor security practices with certificate transparency logs and internet measurements

O Gasser, B Hof, M Helm, M Korczynski, R Holz… - Passive and Active …, 2018 - Springer
In recent years, multiple security incidents involving Certificate Authority (CA) misconduct
demonstrated the need for strengthened certificate issuance processes. Certificate …

Content-agnostic detection of phishing domains using certificate transparency and passive dns

M AlSabah, M Nabeel, Y Boshmaf, E Choo - Proceedings of the 25th …, 2022 - dl.acm.org
Existing phishing detection techniques mainly rely on blacklists or content-based analysis,
which are not only evadable, but also exhibit considerable detection delays as they are …

Private and trustworthy distributed lending model using hyperledger Besu

P Praitheeshan, L Pan, R Doss - SN Computer Science, 2021 - Springer
Financial systems are rapidly becoming decentralized for fulfilling requirements, such as
distributed transactions, security, trustworthiness and elimination of third-party …