A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[HTML][HTML] A systematic review of cybersecurity assessment methods for HTTPS

A Zineddine, O Chakir, Y Sadqi, Y Maleh… - Computers and …, 2024 - Elsevier
Cybersecurity assessments are critical for ensuring that security measures in organizational
infrastructures, systems, and applications meet necessary requirements. Given the …

Encrypted DNS--> privacy? A traffic analysis perspective

S Siby, M Juarez, C Diaz, N Vallina-Rodriguez… - arxiv preprint arxiv …, 2019 - arxiv.org
Virtually every connection to an Internet service is preceded by a DNS lookup which is
performed without any traffic-level protection, thus enabling manipulation, redirection …

Post-quantum authentication in TLS 1.3: a performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

IoTLS: understanding TLS usage in consumer IoT devices

MT Paracha, DJ Dubois, N Vallina-Rodriguez… - Proceedings of the 21st …, 2021 - dl.acm.org
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …

The cookie hunter: Automated black-box auditing for web authentication and authorization flaws

K Drakonakis, S Ioannidis, J Polakis - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …

Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization

R Holz, J Hiller, J Amann, A Razaghpanah… - ACM SIGCOMM …, 2020 - dl.acm.org
Transport Layer Security (TLS) 1.3 is a redesign of the Web's most important security
protocol. It was standardized in August 2018 after a four year-long, unprecedented design …

It's over 9000: analyzing early QUIC deployments with the standardization on the horizon

J Zirngibl, P Buschmann, P Sattler, B Jaeger… - Proceedings of the 21st …, 2021 - dl.acm.org
After nearly five years and 34 draft versions, standardization of the new connection oriented
transport protocol QUIC was finalized in May 2021. Designed as a fundamental network …

Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH

D Sikeridis, P Kampanakis, M Devetsikiotis - Proceedings of the 16th …, 2020 - dl.acm.org
The advances in quantum computing present a threat to public key primitives due to their
ability to solve hard cryptographic problems in polynomial time. To address this threat to …

Analyzing third party service dependencies in modern web services: Have we learned from the mirai-dyn incident?

A Kashaf, V Sekar, Y Agarwal - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Many websites rely on third parties for services (eg, DNS, CDN, etc.). However, it also
exposes them to shared risks from attacks (eg, Mirai DDoS attack [24]) or cascading failures …