The Security Lottery: Measuring {Client-Side} Web Security Inconsistencies

S Roth, S Calzavara, M Wilhelm, A Rabitti… - 31st USENIX Security …, 2022 - usenix.org
To mitigate a myriad of Web attacks, modern browsers support client-side security policies
shipped through HTTP response headers. To enforce these defenses, the server needs to …

Comparing large-scale privacy and security notifications

C Utz, M Michels, M Degeling… - Proceedings on …, 2023 - publications.cispa.saarland
Over the last decade, web security research has used notification campaigns as a tool to
help web operators fix security problems or stop infrastructure abuse. First attempts at …

Adoption of email anti-spoofing schemes: a large scale analysis

S Maroofi, M Korczyński, A Hölzel… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Sending forged emails by taking advantage of domain spoofing is a common technique
used by attackers. The lack of appropriate email anti-spoofing schemes or their …

Deployment of source address validation by network operators: a randomized control trial

Q Lone, A Frik, M Luckie, M Korczyński… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
IP spoofing, sending IP packets with a false source IP address, continues to be a primary
attack vector for large-scale Denial of Service attacks. To combat spoofing, various …

SoK: Technical implementation and human impact of internet privacy regulations

E Birrell, J Rodolitz, A Ding, J Lee… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Growing recognition of the potential for exploitation of personal data and of the shortcomings
of prior privacy regimes has led to the passage of a multitude of new privacy regulations …

Study on domain name system (dns) abuse: Technical report

J Bayer, Y Nosyk, O Hureau, S Fernandez… - arxiv preprint arxiv …, 2022 - arxiv.org
A safe and secure Domain Name System (DNS) is of paramount importance for the digital
economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …

[HTML][HTML] SoK: The past decade of user deception in emails and today's email clients' susceptibility to phishing techniques

MF Veit, O Wiese, FL Ballreich, M Volkamer… - Computers & …, 2025 - Elsevier
User deception in emails is still one of the biggest security risks companies and end-users
face alike. Attackers try to mislead their victims when assessing whether emails are …

Turning the tide on dark pools? towards multi-stakeholder vulnerability notifications in the ad-tech supply chain

Y Vekaria, R Nithyanand, Z Shafiq - arxiv preprint arxiv:2406.06958, 2024 - arxiv.org
Online advertising relies on a complex and opaque supply chain that involves multiple
stakeholders, including advertisers, publishers, and ad-networks, each with distinct and …

[PDF][PDF] Why do internet devices remain vulnerable? a survey with system administrators

T Bondar, H Assal, AR Abdou - Workshop on Measurements …, 2023 - ndss-symposium.org
In efforts to understand the reasons behind Internet-connected devices remaining
vulnerable for a long time, previous literature analyzed the effectiveness of large-scale …

Uncovering the Role of Support Infrastructure in Clickbait PDF Campaigns

G Stivala, G De Stefano, A Mengascini… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Clickbait PDFs, an entry point for multiple Web attacks, are distributed via SEO poisoning
and rank high in search results due to being massively uploaded on abused or …