A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures

N Waheed, X He, M Ikram, M Usman… - ACM computing …, 2020 - dl.acm.org
Security and privacy of users have become significant concerns due to the involvement of
the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at …

The cookie hunter: Automated black-box auditing for web authentication and authorization flaws

K Drakonakis, S Ioannidis, J Polakis - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …

Beyond the front page: Measuring third party dynamics in the field

T Urban, M Degeling, T Holz, N Pohlmann - Proceedings of the web …, 2020 - dl.acm.org
In the modern Web, service providers often rely heavily on third parties to run their services.
For example, they make use of ad networks to finance their services, externally hosted …

On landing and internal web pages: The strange case of jekyll and hyde in web performance measurement

W Aqeel, B Chandrasekaran, A Feldmann… - Proceedings of the …, 2020 - dl.acm.org
There is a rich body of literature on measuring and optimizing nearly every aspect of the
web, including characterizing the structure and content of web pages, devising new …

Jack-in-the-box: An empirical study of javascript bundling on the web and its security implications

J Rack, CA Staicu - Proceedings of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
In recent years, we have seen an increased interest in studying the software supply chain of
user-facing applications to uncover problematic third-party dependencies. Prior work shows …

Analyzing third party service dependencies in modern web services: Have we learned from the mirai-dyn incident?

A Kashaf, V Sekar, Y Agarwal - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Many websites rely on third parties for services (eg, DNS, CDN, etc.). However, it also
exposes them to shared risks from attacks (eg, Mirai DDoS attack [24]) or cascading failures …

How can and would people protect from online tracking?

M Mehrnezhad… - Proceedings on …, 2021 - durham-repository.worktribe.com
Online tracking is complex and users find itchallenging to protect themselves from it. While
the aca-demic community has extensively studied systems andusers for tracking practices …

An empirical assessment of global COVID-19 contact tracing applications

R Sun, W Wang, M Xue, G Tyson… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
The rapid spread of COVID-19 has made manual contact tracing difficult. Thus, various
public health authorities have experimented with automatic contact tracing using mobile …

Analyzing security issues of android mobile health and medical applications

G Tangari, M Ikram, IWB Sentana, K Ijaz… - Journal of the …, 2021 - academic.oup.com
Objective We conduct a first large-scale analysis of mobile health (mHealth) apps available
on Google Play with the goal of providing a comprehensive view of mHealth apps' security …