A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Kee** authorities" honest or bust" with decentralized witness cosigning

E Syta, I Tamas, D Visher, DI Wolinsky… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The secret keys of critical network authorities--such as time, name, certificate, and software
update services--represent high-value targets for hackers, criminals, and spy agencies …

IKP: Turning a PKI around with decentralized automated incentives

S Matsumoto, RM Reischuk - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Despite a great deal of work to improve the TLS PKI, CA misbehavior continues to occur,
resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Post-quantum authentication in TLS 1.3: a performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

Certchain: Public and efficient certificate audit based on blockchain for tls connections

J Chen, S Yao, Q Yuan, K He, S Ji… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
In recent years, real-world attacks against PKI take place frequently. For example, malicious
domains' certificates issued by compromised CAs are widespread, and revoked certificates …

CertLedger: A new PKI model with certificate transparency based on blockchain

MY Kubilay, MS Kiraz, HA Mantar - Computers & Security, 2019 - Elsevier
In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs'
absolute responsibility for providing trustworthiness caused major security and privacy …

Blockchain-based certificate transparency and revocation transparency

Z Wang, J Lin, Q Cai, Q Wang, D Zha… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Traditional X. 509 public key infrastructures (PKIs) depend on trusted certification authorities
(CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure …

Nethammer: Inducing rowhammer faults through network requests

M Lipp, M Schwarz, L Raab, L Lamster… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
In this paper, we present Nethammer, a remote Rowhammer attack without a single attacker-
controlled line of code on the targeted system, ie, not even JavaScript. Nethammer works on …

IoTLS: understanding TLS usage in consumer IoT devices

MT Paracha, DJ Dubois, N Vallina-Rodriguez… - Proceedings of the 21st …, 2021 - dl.acm.org
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …