A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
IoTLS: understanding TLS usage in consumer IoT devices
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …
provide connection security. In this work, we study a large number of TLS-enabled consumer …
Freely given consent? studying consent notice of third-party tracking and its violations of gdpr in android apps
Adopted in May 2018, the European Union's General Data Protection Regulation (GDPR)
requires the consent for processing users' personal data to be freely given, specific …
requires the consent for processing users' personal data to be freely given, specific …
How does usable security (not) end up in software products? results from a qualitative interview study
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …
security features. These features are usually implemented by software professionals during …
Why crypto-detectors fail: A systematic evaluation of cryptographic misuse detection techniques
The correct use of cryptography is central to ensuring data security in modern software
systems. Hence, several academic and commercial static analysis tools have been …
systems. Hence, several academic and commercial static analysis tools have been …
A comparative analysis of certificate pinning in Android & iOS
TLS certificate pinning is a security mechanism used by applications (apps) to protect their
network traffic against malicious certificate authorities (CAs), in-path monitoring, and other …
network traffic against malicious certificate authorities (CAs), in-path monitoring, and other …
“We may share the number of diaper changes”: A Privacy and Security Analysis of Mobile Child Care Applications
Mobile child care management applications can help child care facilities, preschools, and
kindergartens to save time and money by allowing their employees to speed up everyday …
kindergartens to save time and money by allowing their employees to speed up everyday …
" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments
Multi-Factor Authentication is intended to strengthen the security of password-based
authentication by adding another factor, such as hardware tokens or one-time passwords …
authentication by adding another factor, such as hardware tokens or one-time passwords …
[PDF][PDF] Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
Team Chat (TACT) systems are now widely used for online collaborations and project
management. A unique feature of these systems is their integration of third-party apps, which …
management. A unique feature of these systems is their integration of third-party apps, which …