Predicting impending exposure to malicious content from user behavior
Many computer-security defenses are reactive---they operate only when security incidents
take place, or immediately thereafter. Recent efforts have attempted to predict security …
take place, or immediately thereafter. Recent efforts have attempted to predict security …
Certificate transparency in the wild: Exploring the reliability of monitors
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
Replication: No one can hack my mind revisiting a study on expert and {Non-Expert} security practices and advice
K Busse, J Schäfer, M Smith - … on Usable Privacy and Security (SOUPS …, 2019 - usenix.org
A 2015 study by Iulia Ion, Rob Reeder, and Sunny Consolvo examined the self-reported
security behavior of security experts and non-experts. They also analyzed what kind of …
security behavior of security experts and non-experts. They also analyzed what kind of …
COMAR: classification of compromised versus maliciously registered domains
Miscreants abuse thousands of domain names every day by launching large-scale attacks
such as phishing or malware campaigns. While some domains are solely registered for …
such as phishing or malware campaigns. While some domains are solely registered for …
A usability evaluation of Let's Encrypt and Certbot: usable security done right
The correct configuration of HTTPS is a complex set of tasks, which many administrators
have struggled with in the past. Let's Encrypt and Electronic Frontier Foundation's Certbot …
have struggled with in the past. Let's Encrypt and Electronic Frontier Foundation's Certbot …
Cloud strife: mitigating the security risks of domain-validated certificates
Infrastructure-as-a-Service (IaaS), and more generally the" cloud," like Amazon Web
Services (AWS) or Microsoft Azure, have changed the landscape of system operations on …
Services (AWS) or Microsoft Azure, have changed the landscape of system operations on …
DISCO: Sidestep** RPKI's deployment barriers
BGP is a ga** security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …
In log we trust: Revealing poor security practices with certificate transparency logs and internet measurements
In recent years, multiple security incidents involving Certificate Authority (CA) misconduct
demonstrated the need for strengthened certificate issuance processes. Certificate …
demonstrated the need for strengthened certificate issuance processes. Certificate …
Content-agnostic detection of phishing domains using certificate transparency and passive dns
Existing phishing detection techniques mainly rely on blacklists or content-based analysis,
which are not only evadable, but also exhibit considerable detection delays as they are …
which are not only evadable, but also exhibit considerable detection delays as they are …
Private and trustworthy distributed lending model using hyperledger Besu
Financial systems are rapidly becoming decentralized for fulfilling requirements, such as
distributed transactions, security, trustworthiness and elimination of third-party …
distributed transactions, security, trustworthiness and elimination of third-party …