Characterizing vulnerability of DNS AXFR transfers with global-scale scanning

M Skwarek, M Korczynski… - 2019 IEEE Security …, 2019 - ieeexplore.ieee.org
In this paper, we consider security issues related to zone transfers by investigating the
responses of DNS servers to AXFR requests. In particular, we investigate how attackers can …

A large-scale study on the risks of the html5 webapi for mobile sensor-based attacks

F Marcantoni, M Diamantaris, S Ioannidis… - The World Wide Web …, 2019 - dl.acm.org
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks,
which can also be deployed by malicious websites through the HTML5 WebAPI. In this …

Prefix top lists: gaining insights with prefixes from domain-based top lists on DNS deployment

J Naab, P Sattler, J Jelten, O Gasser… - Proceedings of the Internet …, 2019 - dl.acm.org
Domain-based top lists such as the Alexa Top 1M strive to portray the popularity of web
domains. Even though their shortcomings (eg, instability, no aggregation, lack of weights) …

Evaluating the long-term effects of parameters on the characteristics of the tranco top sites ranking

V Le Pochat, T Van Goethem, W Joosen - 12th USENIX Workshop on …, 2019 - usenix.org
Although researchers often use top websites rankings for web measurements, recent studies
have shown that due to the inherent properties and susceptibility to manipulation of these …

Funny accents: Exploring genuine interest in internationalized domain names

V Le Pochat, T Van Goethem, W Joosen - Passive and Active …, 2019 - Springer
Abstract International Domain Names (IDNs) were introduced to support non-ASCII
characters in domain names. In this paper, we explore IDNs that hold genuine interest, ie …

Web performance pitfalls

T Enghardt, T Zinner, A Feldmann - … PAM 2019, Puerto Varas, Chile, March …, 2019 - Springer
Web performance is widely studied in terms of load times, numbers of objects, object sizes,
and total page sizes. However, for all these metrics, there are various definitions, data …

A smörgåsbord of typos: Exploring international keyboard layout typosquatting

V Le Pochat, T Van Goethem… - 2019 IEEE Security and …, 2019 - ieeexplore.ieee.org
Typosquatting is the malicious practice of registering domains that result from typos made
when users try to visit popular domains. Previous works have only considered the US …

Purchased fame: Exploring the ecosystem of private blog networks

T Van Goethem, N Miramirkhani, W Joosen… - Proceedings of the …, 2019 - dl.acm.org
For many, a browsing session starts by entering relevant keywords in a popular search
engine. The websites that users thereafter land on are often determined by their position in …

Who watches the watchmen: Exploring complaints on the web

D Ibosiola, I Castro, G Stringhini, S Uhlig… - The World Wide Web …, 2019 - dl.acm.org
Under increasing scrutiny, many web companies now offer bespoke mechanisms allowing
any third party to file complaints (eg, requesting the de-listing of a URL from a search …

Evaluating the artifacts of SIGCOMM papers

D Saucez, L Iannone, O Bonaventure - ACM SIGCOMM Computer …, 2019 - dl.acm.org
A growing fraction of the papers published by CCR and at SIGCOMM-sponsored
conferences include artifacts such as software or datasets. Besides CCR, these artifacts …