A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[HTML][HTML] A systematic review of cybersecurity assessment methods for HTTPS
Cybersecurity assessments are critical for ensuring that security measures in organizational
infrastructures, systems, and applications meet necessary requirements. Given the …
infrastructures, systems, and applications meet necessary requirements. Given the …
Encrypted DNS--> privacy? A traffic analysis perspective
Virtually every connection to an Internet service is preceded by a DNS lookup which is
performed without any traffic-level protection, thus enabling manipulation, redirection …
performed without any traffic-level protection, thus enabling manipulation, redirection …
Post-quantum authentication in TLS 1.3: a performance study
D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …
and security research professionals due to their ability to solve (elliptic curve) discrete …
IoTLS: understanding TLS usage in consumer IoT devices
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …
provide connection security. In this work, we study a large number of TLS-enabled consumer …
The cookie hunter: Automated black-box auditing for web authentication and authorization flaws
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …
partial or full access to user accounts. Specifically, we develop a novel fully automated black …
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
Transport Layer Security (TLS) 1.3 is a redesign of the Web's most important security
protocol. It was standardized in August 2018 after a four year-long, unprecedented design …
protocol. It was standardized in August 2018 after a four year-long, unprecedented design …
It's over 9000: analyzing early QUIC deployments with the standardization on the horizon
After nearly five years and 34 draft versions, standardization of the new connection oriented
transport protocol QUIC was finalized in May 2021. Designed as a fundamental network …
transport protocol QUIC was finalized in May 2021. Designed as a fundamental network …
Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH
The advances in quantum computing present a threat to public key primitives due to their
ability to solve hard cryptographic problems in polynomial time. To address this threat to …
ability to solve hard cryptographic problems in polynomial time. To address this threat to …
Analyzing third party service dependencies in modern web services: Have we learned from the mirai-dyn incident?
Many websites rely on third parties for services (eg, DNS, CDN, etc.). However, it also
exposes them to shared risks from attacks (eg, Mirai DDoS attack [24]) or cascading failures …
exposes them to shared risks from attacks (eg, Mirai DDoS attack [24]) or cascading failures …