[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
On landing and internal web pages: The strange case of jekyll and hyde in web performance measurement
There is a rich body of literature on measuring and optimizing nearly every aspect of the
web, including characterizing the structure and content of web pages, devising new …
web, including characterizing the structure and content of web pages, devising new …
{WebGraph}: Capturing advertising and tracking information flows for robust blocking
Users rely on ad and tracker blocking tools to protect their privacy. Unfortunately, existing ad
and tracker blocking tools are susceptible to mutable advertising and tracking content. In this …
and tracker blocking tools are susceptible to mutable advertising and tracking content. In this …
Characterizing smart home iot traffic in the wild
As the smart home IoT ecosystem flourishes, it is imperative to gain a better understanding
of the unique challenges it poses in terms of management, security, and privacy. Prior …
of the unique challenges it poses in terms of management, security, and privacy. Prior …
Wtagraph: Web tracking and advertising detection using graph neural networks
Web tracking and advertising (WTA) nowadays are ubiquitously performed on the web,
continuously compromising users' privacy. Existing defense solutions, such as widely …
continuously compromising users' privacy. Existing defense solutions, such as widely …
Khaleesi: Breaker of advertising and tracking request chains
U Iqbal, C Wolfe, C Nguyen, S Englehardt… - 31st USENIX Security …, 2022 - usenix.org
Request chains are being used by advertisers and trackers for information sharing and
circumventing recently introduced privacy protections in web browsers. There is little prior …
circumventing recently introduced privacy protections in web browsers. There is little prior …
Cookiegraph: Understanding and detecting first-party tracking cookies
As third-party cookie blocking is becoming the norm in mainstream web browsers,
advertisers and trackers have started to use first-party cookies for tracking. To understand …
advertisers and trackers have started to use first-party cookies for tracking. To understand …
[HTML][HTML] {AutoFR}: Automated Filter Rule Generation for Adblocking
USENIX Security '23 Technical Sessions | USENIX Sign In Conferences Attend Registration
Information Registration Discounts Grant Opportunities Venue, Hotel, and Travel Program …
Information Registration Discounts Grant Opportunities Venue, Hotel, and Travel Program …
Blocking javascript without breaking the web: An empirical investigation
Modern websites heavily rely on JavaScript (JS) to implement legitimate functionality as well
as privacy-invasive advertising and tracking. Browser extensions such as NoScript block any …
as privacy-invasive advertising and tracking. Browser extensions such as NoScript block any …