Characterizing vulnerability of DNS AXFR transfers with global-scale scanning
M Skwarek, M Korczynski… - 2019 IEEE Security …, 2019 - ieeexplore.ieee.org
In this paper, we consider security issues related to zone transfers by investigating the
responses of DNS servers to AXFR requests. In particular, we investigate how attackers can …
responses of DNS servers to AXFR requests. In particular, we investigate how attackers can …
A large-scale study on the risks of the html5 webapi for mobile sensor-based attacks
F Marcantoni, M Diamantaris, S Ioannidis… - The World Wide Web …, 2019 - dl.acm.org
Smartphone sensors can be leveraged by malicious apps for a plethora of different attacks,
which can also be deployed by malicious websites through the HTML5 WebAPI. In this …
which can also be deployed by malicious websites through the HTML5 WebAPI. In this …
Prefix top lists: gaining insights with prefixes from domain-based top lists on DNS deployment
Domain-based top lists such as the Alexa Top 1M strive to portray the popularity of web
domains. Even though their shortcomings (eg, instability, no aggregation, lack of weights) …
domains. Even though their shortcomings (eg, instability, no aggregation, lack of weights) …
Evaluating the long-term effects of parameters on the characteristics of the tranco top sites ranking
V Le Pochat, T Van Goethem, W Joosen - 12th USENIX Workshop on …, 2019 - usenix.org
Although researchers often use top websites rankings for web measurements, recent studies
have shown that due to the inherent properties and susceptibility to manipulation of these …
have shown that due to the inherent properties and susceptibility to manipulation of these …
Funny accents: Exploring genuine interest in internationalized domain names
V Le Pochat, T Van Goethem, W Joosen - Passive and Active …, 2019 - Springer
Abstract International Domain Names (IDNs) were introduced to support non-ASCII
characters in domain names. In this paper, we explore IDNs that hold genuine interest, ie …
characters in domain names. In this paper, we explore IDNs that hold genuine interest, ie …
Web performance pitfalls
Web performance is widely studied in terms of load times, numbers of objects, object sizes,
and total page sizes. However, for all these metrics, there are various definitions, data …
and total page sizes. However, for all these metrics, there are various definitions, data …
A smörgåsbord of typos: Exploring international keyboard layout typosquatting
V Le Pochat, T Van Goethem… - 2019 IEEE Security and …, 2019 - ieeexplore.ieee.org
Typosquatting is the malicious practice of registering domains that result from typos made
when users try to visit popular domains. Previous works have only considered the US …
when users try to visit popular domains. Previous works have only considered the US …
Purchased fame: Exploring the ecosystem of private blog networks
T Van Goethem, N Miramirkhani, W Joosen… - Proceedings of the …, 2019 - dl.acm.org
For many, a browsing session starts by entering relevant keywords in a popular search
engine. The websites that users thereafter land on are often determined by their position in …
engine. The websites that users thereafter land on are often determined by their position in …
Who watches the watchmen: Exploring complaints on the web
Under increasing scrutiny, many web companies now offer bespoke mechanisms allowing
any third party to file complaints (eg, requesting the de-listing of a URL from a search …
any third party to file complaints (eg, requesting the de-listing of a URL from a search …
Evaluating the artifacts of SIGCOMM papers
A growing fraction of the papers published by CCR and at SIGCOMM-sponsored
conferences include artifacts such as software or datasets. Besides CCR, these artifacts …
conferences include artifacts such as software or datasets. Besides CCR, these artifacts …