[HTML][HTML] A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset

E Chatzoglou, V Kouliaridis, G Kambourakis… - Computers & …, 2023 - Elsevier
Following QUIC protocol ratification on May 2021, the third major version of the Hypertext
Transfer Protocol, namely HTTP/3, was published around one year later in RFC 9114. In …

Talking with familiar strangers: An empirical study on https context confusion attacks

M Zhang, X Zheng, K Shen, Z Kong, C Lu… - Proceedings of the …, 2020 - dl.acm.org
HTTPS is principally designed for secure end-to-end communication, which adds
confidentiality and integrity to sensitive data transmission. While several man-in-the-middle …

Measuring HTTP/3: Adoption and performance

M Trevisan, D Giordano, I Drago… - 2021 19th …, 2021 - ieeexplore.ieee.org
The third version of the Hypertext Transfer Protocol (HTTP) is in its final standardization
phase by the IETF. Besides better security and increased flexibility, it promises benefits in …

{FRAMESHIFTER}: Security implications of {HTTP/2-to-HTTP/1} conversion anomalies

B Jabiyev, S Sprecher, A Gavazzi, T Innocenti… - 31st USENIX Security …, 2022 - usenix.org
HTTP/2 adoption is rapidly climbing. However, in practice, Internet communications still
rarely happen over end-to-end HTTP/2 channels. This is due to Content Delivery Networks …

Investigating HTTP response headers for the classification of devices on the Internet

A Lavrenovs, G Visky - 2019 IEEE 7th IEEE Workshop on …, 2019 - ieeexplore.ieee.org
Devices that are connected to the Internet are of great interest to malicious parties and
security researchers alike, as direct remote reachability places them at the highest risk of …

H DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol

X Ling, C Wu, S Ji, M Han - … Conference on Security and Privacy in …, 2017 - Springer
HTTP/2, as the latest version of application layer protocol, is experiencing an exponentially
increasing adoption by both servers and browsers. Due to the new features introduced by …

Practical end-to-end web content integrity

K Singh, HJ Wang, A Moshchuk, C Jackson… - Proceedings of the 21st …, 2012 - dl.acm.org
Widespread growth of open wireless hotspots has made it easy to carry out man-in-the-
middle attacks and impersonate web sites. Although HTTPS can be used to prevent such …

Postcards from the post-http world: Amplification of https vulnerabilities in the web ecosystem

S Calzavara, R Focardi, M Nemec… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
HTTPS aims at securing communication over the Web by providing a cryptographic
protection layer that ensures the confidentiality and integrity of communication and enables …

Towards a safe playground for HTTPS and middle boxes with QoS2

Z Zhou, T Benson - Proceedings of the 2015 ACM SIGCOMM Workshop …, 2015 - dl.acm.org
With the increasing concern for network security and privacy, adoption of HTTPS has sky-
rocket, with over 50% of traffic flows employing HTTPS. Unfortunately by encrypting the data …

Neither good nor bad: A large-scale empirical analysis of HTTP security response headers

G Karopoulos, D Geneiatakis… - … Conference on Trust and …, 2021 - Springer
HTTP security-focused response headers can be of great aid to web applications towards
augmenting their overall security level. That is, if set at the server side, these headers define …