Tranco: A research-oriented top sites ranking hardened against manipulation

VL Pochat, T Van Goethem… - arXiv preprint arXiv …, 2018 - arxiv.org
In order to evaluate the prevalence of security and privacy practices on a representative
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

The cookie hunter: Automated black-box auditing for web authentication and authorization flaws

K Drakonakis, S Ioannidis, J Polakis - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

A Kharraz, Z Ma, P Murley, C Lever, J Mason… - The World Wide Web …, 2019 - dl.acm.org
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …

On landing and internal web pages: The strange case of jekyll and hyde in web performance measurement

W Aqeel, B Chandrasekaran, A Feldmann… - Proceedings of the …, 2020 - dl.acm.org
There is a rich body of literature on measuring and optimizing nearly every aspect of the
web, including characterizing the structure and content of web pages, devising new …

Signing in four public software package registries: Quantity, quality, and influencing factors

TR Schorlemmer, KG Kalu, L Chigges… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Many software applications incorporate open-source third-party packages distributed by
public package registries. Guaranteeing authorship along this supply chain is a challenge …

Analyzing third party service dependencies in modern web services: Have we learned from the mirai-dyn incident?

A Kashaf, V Sekar, Y Agarwal - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Many websites rely on third parties for services (eg, DNS, CDN, etc.). However, it also
exposes them to shared risks from attacks (eg, Mirai DDoS attack [24]) or cascading failures …

The chain of implicit trust: An analysis of the web third-party resources loading

M Ikram, R Masood, G Tyson, MA Kaafar… - The World Wide Web …, 2019 - dl.acm.org
The Web is a tangled mass of interconnected services, where websites import a range of
external resources from various third-party domains. The latter can also load resources …

Journey to the center of the cookie ecosystem: Unraveling actors' roles and relationships

I Sanchez-Rola, M Dell'Amico… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Web pages have been steadily increasing in complexity over time, including code snippets
from several distinct origins and organizations. While this may be a known phenomenon, its …

Who's hosting the block party? studying third-party blockage of csp and sri

M Steffens, M Musch, M Johns… - Network and …, 2021 - publications.cispa.saarland
The Web has grown into the most widely used application platform for our daily lives. First-
party Web applications thrive due to many different third parties they rely on to provide …