Measuring cookies and web privacy in a post-gdpr world

A Dabrowski, G Merzdovnik, J Ullrich… - Passive and Active …, 2019 - Springer
Abstract In response, the European Union has adopted the General Data Protection
Regulation (GDPR), a legislative framework for data protection empowering individuals to …

The leaky web: Automated discovery of cross-site information leaks in browsers and the web

J Rautenstrauch, G Pellegrino… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
When browsing the web, none of us want sites to infer which other sites we may have visited
before or are logged in to. However, attacker-controlled sites may infer this state through …

[PDF][PDF] Awakening the web's sleeper agents: Misusing service workers for privacy leakage

S Karami, P Ilia, J Polakis - Network and Distributed System Security …, 2021 - par.nsf.gov
Service workers are a powerful technology supported by all major modern browsers that can
improve users' browsing experience by offering capabilities similar to those of native …

Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks

M Sangeen, NA Bhatti, K Kifayat, AA Alsadhan… - Computer …, 2023 - Elsevier
The use of public wireless access points (APs) has likely increased with the rise of wireless
devices such as smartphones, tablets, smartwatches, etc. These devices make it easy for …

ETGuard: detecting D2D attacks using wireless evil twins

V Jain, V Laxmi, MS Gaur, M Mosbah - Computers & Security, 2019 - Elsevier
In this paper, we demonstrate a realistic variant of wireless Evil Twins (ETs) for launching
device to device (D2D) attacks over the network, particularly for Android. An ET can be …

EAP-SH: an EAP authentication protocol to integrate captive portals in the 802.1 X security architecture

N Marques, A Zúquete, JP Barraca - Wireless Personal Communications, 2020 - Springer
In a scenario where hotspot wireless networks are increasingly being used, and given the
amount of sensitive information exchanged on Internet interactions, there is the need to …

Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers

PL Wang, KH Chou, SC Hsiao, AT Low… - … Conference on Applied …, 2023 - Springer
Granting access to public Wi-Fi networks heavily relies on captive portals that are accessible
using dedicated browsers. This paper highlights that such browsers are crucial to captive …

[PDF][PDF] The rogue access point identification: A model and classification review

D DA Arisandi… - The Indonesian …, 2021 - pdfs.semanticscholar.org
Most people around the world make use of public Wi-Fi hotspots, as their daily routine
companion in communication. The access points (APs) of public Wi-Fi are easily deployed …

Alternative (ab) uses for {HTTP} Alternative Services

T Tiwari, A Trachtenberg - 13th USENIX Workshop on Offensive …, 2019 - usenix.org
The HTTP Alternative Services header (Alt-Svc) was introduced in 2013 in a bid to
streamline load balancing, protocol optimizations, and client segmentation, and it has since …

User authentication using client-side browse history

DE Canavor, WA Strand - US Patent 10,212,170, 2019 - Google Patents
Techniques for authenticating a user may be described. In particular, a network-based
document may be provided to a computing system of a user. The network-based document …