A survey on encrypted network traffic analysis applications, techniques, and countermeasures
E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …
Robust smartphone app identification via encrypted network traffic analysis
The apps installed on a smartphone can reveal much information about a user, such as their
medical conditions, sexual orientation, or religious beliefs. In addition, the presence or …
medical conditions, sexual orientation, or religious beliefs. In addition, the presence or …
50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …
sensitive data and system resources. However, apps can circumvent the permission model …
Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem
A Razaghpanah, R Nithyanand… - The 25th annual …, 2018 - dspace.networks.imdea.org
Third-party services form an integral part of the mobile ecosystem: they ease application
development and enable features such as analytics, social network integration, and app …
development and enable features such as analytics, social network integration, and app …
Recon: Revealing and controlling pii leaks in mobile network traffic
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …
personally identifiable information (PII); however, these users have little visibility into PII …
An analysis of the privacy and security risks of android vpn permission-enabled apps
Millions of users worldwide resort to mobile VPN clients to either circumvent censorship or to
access geo-blocked content, and more generally for privacy and security purposes. In …
access geo-blocked content, and more generally for privacy and security purposes. In …
A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
Large-scale mobile app identification using deep learning
Many network services and tools (eg network monitors, malware-detection systems, routing
and billing policy enforcement modules in ISPs) depend on identifying the type of traffic that …
and billing policy enforcement modules in ISPs) depend on identifying the type of traffic that …