DNS observatory: The big picture of the DNS

P Foremski, O Gasser, GCM Moura - Proceedings of the Internet …, 2019 - dl.acm.org
The Domain Name System (DNS) is thought of as having the simple-sounding task of
resolving domains into IP addresses. With its stub resolvers, different layers of recursive …

No more chasing waterfalls: a measurement study of the header bidding ad-ecosystem

M Pachilakis, P Papadopoulos, EP Markatos… - Proceedings of the …, 2019 - dl.acm.org
In recent years, Header Bidding (HB) has gained popularity among web publishers,
challenging the status quo in the ad ecosystem. Contrary to the traditional waterfall standard …

Clustering and the weekend effect: Recommendations for the use of top domain lists in security research

W Rweyemamu, T Lauinger, C Wilson… - Passive and Active …, 2019 - Springer
Top domain rankings (eg, Alexa) are commonly used in security research, such as to survey
security features or vulnerabilities of “relevant” websites. Due to their central role in selecting …

A Longitudinal Analysis of the ads. txt Standard

MA Bashir, S Arshad, E Kirda, W Robertson… - Proceedings of the …, 2019 - dl.acm.org
Programmatic advertising provides digital ad buyers with the convenience of purchasing ad
impressions through Real Time Bidding (RTB) auctions. However, programmatic advertising …

Scalable scanning and automatic classification of {TLS} padding oracle vulnerabilities

R Merget, J Somorovsky, N Aviram, C Young… - 28th USENIX Security …, 2019 - usenix.org
The TLS protocol provides encryption, data integrity, and authentication on the modern
Internet. Despite the protocol's importance, currently-deployed TLS versions use obsolete …

A first look at QNAME minimization in the domain name system

WB de Vries, Q Scheitle, M Müller, W Toorop… - Passive and Active …, 2019 - Springer
Abstract The Domain Name System (DNS) is a critical part of network and Internet
infrastructure; DNS lookups precede almost any user request. DNS lookups may contain …

Clash of the trackers: Measuring the evolution of the online tracking ecosystem

K Solomos, P Ilia, S Ioannidis, N Kourtellis - arXiv preprint arXiv …, 2019 - arxiv.org
Websites are constantly adapting the methods used, and intensity with which they track
online visitors. However, the wide-range enforcement of GDPR since one year ago (May …

DDoS hide & seek: on the effectiveness of a booter services takedown

D Kopp, M Wichtlhuber, I Poese, J Santanna… - Proceedings of the …, 2019 - dl.acm.org
Booter services continue to provide popular DDoS-as-a-service platforms and enable
anyone irrespective of their technical ability, to execute DDoS attacks with devastating …

{DomainScouter}: Understanding the Risks of Deceptive {IDNs}

D Chiba, AA Hasegawa, T Koide, Y Sawabe… - … on Research in Attacks …, 2019 - usenix.org
Cyber attackers create domain names that are visually similar to those of legitimate/popular
brands by abusing valid internationalized domain names (IDNs). In this work, we …

The era of TLS 1.3: Measuring deployment and use with active and passive methods

R Holz, J Amann, A Razaghpanah… - arXiv preprint arXiv …, 2019 - arxiv.org
TLS 1.3 marks a significant departure from previous versions of the Transport Layer Security
protocol (TLS). The new version offers a simplified protocol flow, more secure cryptographic …