Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH

D Sikeridis, P Kampanakis, M Devetsikiotis - Proceedings of the 16th …, 2020 - dl.acm.org
The advances in quantum computing present a threat to public key primitives due to their
ability to solve hard cryptographic problems in polynomial time. To address this threat to …

TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication

R Holz, J Amann, O Mehani, M Wachs… - arXiv preprint arXiv …, 2015 - arxiv.org
The majority of electronic communication today happens either via email or chat. Thanks to
the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat …

Easing the conscience with OPC UA: An internet-wide study on insecure deployments

M Dahlmanns, J Lohmöller, IB Fink… - Proceedings of the …, 2020 - dl.acm.org
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …

Scanning the IPv6 internet: towards a comprehensive hitlist

O Gasser, Q Scheitle, S Gebhard, G Carle - arXiv preprint arXiv …, 2016 - arxiv.org
Active network measurements constitute an impor-tant part in gaining a better understanding
of the Internet. Although IPv4-wide scans are now easily possible, random active probing is …

Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things

M Dahlmanns, J Lohmöller, J Pennekamp… - Proceedings of the …, 2022 - dl.acm.org
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …

Bitter harvest: Systematically fingerprinting low-and medium-interaction honeypots at internet scale

A Vetterl, R Clayton - 12th USENIX Workshop on Offensive Technologies …, 2018 - usenix.org
The current generation of low-and medium interaction honeypots uses off-the-shelf libraries
to provide the transport layer. We show that this architecture is fatally flawed because the …

Pushing Alias Resolution to the Limit

T Albakour, O Gasser, G Smaragdakis - Proceedings of the 2023 ACM on …, 2023 - dl.acm.org
In this paper, we show that utilizing multiple protocols offers a unique opportunity to improve
IP alias resolution and dual-stack inference substantially. Our key observation is that …

FTP: The forgotten cloud

D Springall, Z Durumeric… - 2016 46th Annual IEEE …, 2016 - ieeexplore.ieee.org
Once pervasive, the File Transfer Protocol (FTP) has been largely supplanted by HTTP,
SCP, and BitTorrent for transferring data between hosts. Yet, in a comprehensive analysis of …

Honeypots in the age of universal attacks and the Internet of Things

A Vetterl - 2020 - repository.cam.ac.uk
Today's Internet connects billions of physical devices. These devices are often immature and
insecure, and share common vulnerabilities. The predominant form of attacks relies on …

Mobile devices and remote labs in engineering education

J Garcia-Zubia, D López-de-Ipiña… - 2008 Eighth IEEE …, 2008 - ieeexplore.ieee.org
The remote labs or WebLabs promote the experimentation in the studies of engineering
allowing the access and control of real laboratory equipment through Internet. In general a …