The challenges of leveraging threat intelligence to stop data breaches

A Ibrahim, D Thiruvady, JG Schneider… - Frontiers in Computer …, 2020 - frontiersin.org
Despite the significant increase in cybersecurity solutions investment, organizations are still
plagued by security breaches, especially data breaches. As more organizations experience …

The rise of website fingerprinting on Tor: Analysis on techniques and assumptions

MAIM Aminuddin, ZF Zaaba, A Samsudin, F Zaki… - Journal of Network and …, 2023 - Elsevier
Tor is one of the most popular anonymity networks that allows Internet users to hide their
browsing activity. Hiding browsing activity is essential for Internet users to increase their …

Crimebb: Enabling cybercrime research on underground forums at scale

S Pastrana, DR Thomas, A Hutchings… - Proceedings of the 2018 …, 2018 - dl.acm.org
Underground forums allow criminals to interact, exchange knowledge, and trade in products
and services. They also provide a pathway into cybercrime, tempting the curious to join …

Karaoke: Distributed private messaging immune to passive traffic analysis

D Lazar, Y Gilad, N Zeldovich - 13th USENIX Symposium on Operating …, 2018 - usenix.org
Karaoke is a system for low-latency metadata-private communication. Karaoke provides
differential privacy guarantees, and scales better with the number of users than prior such …

DarkBERT: A language model for the dark side of the Internet

Y Jin, E Jang, J Cui, JW Chung, Y Lee… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent research has suggested that there are clear differences in the language used in the
Dark Web compared to that of the Surface Web. As studies on the Dark Web commonly …

[PDF][PDF] OpenSGX: An Open Platform for SGX Research.

P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee… - NDSS, 2016 - academia.edu
Hardware technologies for trusted computing, or trusted execution environments (TEEs),
have rapidly matured over the last decade. In fact, TEEs are at the brink of widespread …

Enhancing security and privacy of tor's ecosystem by using trusted execution environments

S Kim, J Han, J Ha, T Kim, D Han - 14th USENIX Symposium on …, 2017 - usenix.org
With Tor being a popular anonymity network, many attacks have been proposed to break its
anonymity or leak information of a private communication on Tor. However, guaranteeing …

The cracked cookie jar: HTTP cookie hijacking and the exposure of private information

S Sivakorn, I Polakis… - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The widespread demand for online privacy, also fueled by widely-publicized demonstrations
of session hijacking attacks against popular websites, has spearheaded the increasing …

Do you see what I see? differential treatment of anonymous users

S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan… - 2016 - discovery.ucl.ac.uk
The utility of anonymous communication is undermined by a growing number of websites
treating users of such services in a degraded fashion. The second-class treatment of …

An empirical analysis of the commercial vpn ecosystem

MT Khan, J DeBlasio, GM Voelker… - Proceedings of the …, 2018 - dl.acm.org
Global Internet users increasingly rely on virtual private network (VPN) services to preserve
their privacy, circumvent censorship, and access geo-filtered content. Due to their own lack …