Exploring the characteristics and security risks of emerging emoji domain names

M Liu, Y Zhang, B Liu, H Duan - European Symposium on Research in …, 2022 - Springer
… best security practices for applications to handle emoji domains securely. … requests would
be redirected to other websites. Totally, we find 9,265 landing domains which are redirected

Polygon: a QUIC-based CDN server selection system supporting multiple resource demands

M Zhou, T Guo, Y Chen, J Wan, X Wang - Proceedings of the 22nd …, 2021 - dl.acm.org
… algorithm with redundant forwarding to handle the single point of … requests are redirected
to other regions. When a nearby CDN server reaches its capacity, Polygon forwards the request

Quantifying user password exposure to third-party cdns

R Xin, S Lin, X Yang - International Conference on Passive and Active …, 2023 - Springer
… difference in request redirection methods. Cloudflare uses anycast for request redirection by
… Our framework can handle issues that are common in legitimate sites but rare in phishing …

Measuring UID smuggling in the wild

A Randall, P Snyder, A Ukani, AC Snoeren… - Proceedings of the …, 2022 - dl.acm.org
… ’s navigation requests by adding information to the navigation may also redirect the user to
requests by implementing a handler for the chrome.webRequest.onBeforeRequest event. …

Towards understanding first-party cookie tracking in the field

N Demir, D Theis, T Urban, N Pohlmann - arXiv preprint arXiv:2202.01498, 2022 - arxiv.org
… send it to the tracker in a dedicated request. Hence, deleting, or … presence of a tracker by
redirection of request on DNS level (“… More specifically, we log the URL handled by the browser …

An architecture of identity management and thirdparty integration for online teaching in a university

A Alexandrescu, G Butnaru - 2020 24th International …, 2020 - ieeexplore.ieee.org
… Secondly, although redirection to the SSO portal is made … is the one made available by the
IMC to the SSOMC. If there is a … Also, at the time of writing this paper, it does not handle well …

[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
requests to the organization’s legitimate website or requests … our approach, or had redirection
chains which could not be … times, we only handled anonymized session or account identi …

Comparing Communication Efficiency: HTTP/3 versus HTTP/1.1 Latency in RESTful APIs

P Tripathi, MH Miraz, S Joshi - 2023 International Conference …, 2023 - ieeexplore.ieee.org
requests to a representative REST API equipped with both protocols. Key latency components,
such as connection, redirection, … This suggests that HTTP/3 can handle larger amounts of …

Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector

H Shuang, L Zhao, D Lie - arXiv preprint arXiv:2402.08031, 2024 - arxiv.org
… at the request field granularity, allowing Dumviri to handle some … and sku_id) will break the
redirection: the URL will land on a … inside a single functional request (ie, redirection request). …

TTL Violation of DNS Resolvers in the Wild

P Bhowmick, MI Ashiq, C Deccio, T Chung - International Conference on …, 2023 - Springer
… -based redirection scheme such as Akamai [23] to redirectrequests a domain, www.reddit.com,
it will redirect to another domain controlled by Fastly, so that they can handle the request