A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

IoTLS: understanding TLS usage in consumer IoT devices

MT Paracha, DJ Dubois, N Vallina-Rodriguez… - Proceedings of the 21st …, 2021 - dl.acm.org
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …

Freely given consent? studying consent notice of third-party tracking and its violations of gdpr in android apps

TT Nguyen, M Backes, B Stock - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Adopted in May 2018, the European Union's General Data Protection Regulation (GDPR)
requires the consent for processing users' personal data to be freely given, specific …

How does usable security (not) end up in software products? results from a qualitative interview study

M Gutfleisch, JH Klemmer, N Busch… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …

Why crypto-detectors fail: A systematic evaluation of cryptographic misuse detection techniques

AS Ami, N Cooper, K Kafle, K Moran… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The correct use of cryptography is central to ensuring data security in modern software
systems. Hence, several academic and commercial static analysis tools have been …

A comparative analysis of certificate pinning in Android & iOS

A Pradeep, MT Paracha, P Bhowmick… - Proceedings of the …, 2022 - dl.acm.org
TLS certificate pinning is a security mechanism used by applications (apps) to protect their
network traffic against malicious certificate authorities (CAs), in-path monitoring, and other …

“We may share the number of diaper changes”: A Privacy and Security Analysis of Mobile Child Care Applications

M Gruber, C Höfig, M Golla, T Urban… - Proceedings on …, 2022 - petsymposium.org
Mobile child care management applications can help child care facilities, preschools, and
kindergartens to save time and money by allowing their employees to speed up everyday …

" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

S Amft, S Höltervennhoff, N Huaman, A Krause… - Proceedings of the …, 2023 - dl.acm.org
Multi-Factor Authentication is intended to strengthen the security of password-based
authentication by adding another factor, such as hardware tokens or one-time passwords …

[PDF][PDF] Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.

M Zha, J Wang, Y Nan, X Wang, Y Zhang, Z Yang - NDSS, 2022 - ndss-symposium.org
Team Chat (TACT) systems are now widely used for online collaborations and project
management. A unique feature of these systems is their integration of third-party apps, which …