A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Seven years in the life of Hypergiants' off-nets
Content Hypergiants deliver the vast majority of Internet traffic to end users. In recent years,
some have invested heavily in deploying services and servers inside end-user networks …
some have invested heavily in deploying services and servers inside end-user networks …
[PDF][PDF] A comprehensive survey of recent internet measurement techniques for cyber security
M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Mission accomplished? HTTPS security after DigiNotar
Driven by CA compromises and the risk of man-in-the-middle attacks, new security features
have been added to TLS, HTTPS, and the web PKI over the past five years. These include …
have been added to TLS, HTTPS, and the web PKI over the past five years. These include …
CRLite: A scalable system for pushing all TLS revocations to all browsers
Currently, no major browser fully checks for TLS/SSL certificate revocations. This is largely
due to the fact that the deployed mechanisms for disseminating revocations (CRLs, OCSP …
due to the fact that the deployed mechanisms for disseminating revocations (CRLs, OCSP …
Analysis of SSL certificate reissues and revocations in the wake of Heartbleed
Central to the secure operation of a public key infrastructure (PKI) is the ability to revoke
certificates. While much of users' security rests on this process taking place quickly, in …
certificates. While much of users' security rests on this process taking place quickly, in …
The rise of certificate transparency and its implications on the internet ecosystem
Q Scheitle, O Gasser, T Nolte, J Amann… - Proceedings of the …, 2018 - dl.acm.org
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and
explore the implications of exposing certificate DNS names from the perspective of security …
explore the implications of exposing certificate DNS names from the perspective of security …
Analyzing third party service dependencies in modern web services: Have we learned from the mirai-dyn incident?
Many websites rely on third parties for services (eg, DNS, CDN, etc.). However, it also
exposes them to shared risks from attacks (eg, Mirai DDoS attack [24]) or cascading failures …
exposes them to shared risks from attacks (eg, Mirai DDoS attack [24]) or cascading failures …
Measurement and analysis of private key sharing in the https ecosystem
The semantics of online authentication in the web are rather straightforward: if Alice has a
certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of …
certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of …
Certificate transparency in the wild: Exploring the reliability of monitors
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …