DNS observatory: The big picture of the DNS
The Domain Name System (DNS) is thought of as having the simple-sounding task of
resolving domains into IP addresses. With its stub resolvers, different layers of recursive …
resolving domains into IP addresses. With its stub resolvers, different layers of recursive …
No more chasing waterfalls: a measurement study of the header bidding ad-ecosystem
In recent years, Header Bidding (HB) has gained popularity among web publishers,
challenging the status quo in the ad ecosystem. Contrary to the traditional waterfall standard …
challenging the status quo in the ad ecosystem. Contrary to the traditional waterfall standard …
Clustering and the weekend effect: Recommendations for the use of top domain lists in security research
W Rweyemamu, T Lauinger, C Wilson… - Passive and Active …, 2019 - Springer
Top domain rankings (eg, Alexa) are commonly used in security research, such as to survey
security features or vulnerabilities of “relevant” websites. Due to their central role in selecting …
security features or vulnerabilities of “relevant” websites. Due to their central role in selecting …
A Longitudinal Analysis of the ads. txt Standard
Programmatic advertising provides digital ad buyers with the convenience of purchasing ad
impressions through Real Time Bidding (RTB) auctions. However, programmatic advertising …
impressions through Real Time Bidding (RTB) auctions. However, programmatic advertising …
Scalable scanning and automatic classification of {TLS} padding oracle vulnerabilities
The TLS protocol provides encryption, data integrity, and authentication on the modern
Internet. Despite the protocol's importance, currently-deployed TLS versions use obsolete …
Internet. Despite the protocol's importance, currently-deployed TLS versions use obsolete …
A first look at QNAME minimization in the domain name system
Abstract The Domain Name System (DNS) is a critical part of network and Internet
infrastructure; DNS lookups precede almost any user request. DNS lookups may contain …
infrastructure; DNS lookups precede almost any user request. DNS lookups may contain …
Clash of the trackers: Measuring the evolution of the online tracking ecosystem
Websites are constantly adapting the methods used, and intensity with which they track
online visitors. However, the wide-range enforcement of GDPR since one year ago (May …
online visitors. However, the wide-range enforcement of GDPR since one year ago (May …
DDoS hide & seek: on the effectiveness of a booter services takedown
D Kopp, M Wichtlhuber, I Poese, J Santanna… - Proceedings of the …, 2019 - dl.acm.org
Booter services continue to provide popular DDoS-as-a-service platforms and enable
anyone irrespective of their technical ability, to execute DDoS attacks with devastating …
anyone irrespective of their technical ability, to execute DDoS attacks with devastating …
{DomainScouter}: Understanding the Risks of Deceptive {IDNs}
Cyber attackers create domain names that are visually similar to those of legitimate/popular
brands by abusing valid internationalized domain names (IDNs). In this work, we …
brands by abusing valid internationalized domain names (IDNs). In this work, we …
The era of TLS 1.3: Measuring deployment and use with active and passive methods
R Holz, J Amann, A Razaghpanah… - arXiv preprint arXiv …, 2019 - arxiv.org
TLS 1.3 marks a significant departure from previous versions of the Transport Layer Security
protocol (TLS). The new version offers a simplified protocol flow, more secure cryptographic …
protocol (TLS). The new version offers a simplified protocol flow, more secure cryptographic …