A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Seven years in the life of Hypergiants' off-nets

P Gigis, M Calder, L Manassakis, G Nomikos… - Proceedings of the …, 2021 - dl.acm.org
Content Hypergiants deliver the vast majority of Internet traffic to end users. In recent years,
some have invested heavily in deploying services and servers inside end-user networks …

[PDF][PDF] A comprehensive survey of recent internet measurement techniques for cyber security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Mission accomplished? HTTPS security after DigiNotar

J Amann, O Gasser, Q Scheitle, L Brent… - Proceedings of the …, 2017 - dl.acm.org
Driven by CA compromises and the risk of man-in-the-middle attacks, new security features
have been added to TLS, HTTPS, and the web PKI over the past five years. These include …

CRLite: A scalable system for pushing all TLS revocations to all browsers

J Larisch, D Choffnes, D Levin… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Currently, no major browser fully checks for TLS/SSL certificate revocations. This is largely
due to the fact that the deployed mechanisms for disseminating revocations (CRLs, OCSP …

Analysis of SSL certificate reissues and revocations in the wake of Heartbleed

L Zhang, D Choffnes, D Levin, T Dumitraş… - Proceedings of the …, 2014 - dl.acm.org
Central to the secure operation of a public key infrastructure (PKI) is the ability to revoke
certificates. While much of users' security rests on this process taking place quickly, in …

The rise of certificate transparency and its implications on the internet ecosystem

Q Scheitle, O Gasser, T Nolte, J Amann… - Proceedings of the …, 2018 - dl.acm.org
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and
explore the implications of exposing certificate DNS names from the perspective of security …

Analyzing third party service dependencies in modern web services: Have we learned from the mirai-dyn incident?

A Kashaf, V Sekar, Y Agarwal - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Many websites rely on third parties for services (eg, DNS, CDN, etc.). However, it also
exposes them to shared risks from attacks (eg, Mirai DDoS attack [24]) or cascading failures …

Measurement and analysis of private key sharing in the https ecosystem

F Cangialosi, T Chung, D Choffnes, D Levin… - Proceedings of the …, 2016 - dl.acm.org
The semantics of online authentication in the web are rather straightforward: if Alice has a
certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of …

Certificate transparency in the wild: Exploring the reliability of monitors

B Li, J Lin, F Li, Q Wang, Q Li, J Jing… - Proceedings of the 2019 …, 2019 - dl.acm.org
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …