Target acquired? Evaluating target generation algorithms for IPv6

L Steger, L Kuang, J Zirngibl, G Carle… - 2023 7th Network …, 2023 - ieeexplore.ieee.org
Internet measurements are a crucial foundation of IPv6-related research. Due to the
infeasibility of full address space scans for IPv6 however, those measurements rely on …

Measuring the accessibility of domain name encryption and its impact on internet filtering

NP Hoang, M Polychronakis, P Gill - International Conference on Passive …, 2022 - Springer
Most online communications rely on DNS to map domain names to their hosting IP address
(es). Previous work has shown that DNS-based network interference is widespread due to …

Certainty: Detecting dns manipulation at scale using tls certificates

E Tsai, D Kumar, RS Raman, G Li, Y Eiger… - arXiv preprint arXiv …, 2023 - arxiv.org
DNS manipulation is an increasingly common technique used by censors and other network
adversaries to prevent users from accessing restricted Internet resources and hijack their …

Many Roads Lead To Rome: How Packet Headers Influence {DNS} Censorship Measurement

A Bhaskar, P Pearce - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
Internet censorship is widespread, impacting citizens of hundreds of countries around the
world. Recent work has developed techniques that can perform widespread, longitudinal …

A longitudinal study of the top 1% toxic Twitter profiles

H Qayyum, B Zi Hao Zhao, I Wood, M Ikram… - Proceedings of the 15th …, 2023 - dl.acm.org
Toxicity is endemic to online social networks (OSNs) including Twitter. It follows a Pareto-like
distribution where most of the toxicity is generated by a very small number of profiles and as …

Security foundations for application-based covert communication channels

JKH Iv, M Georgiou, AJ Malozemoff… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
We introduce the notion of an application-based covert channel—or ABCC—which provides
a formal syntax for describing covert channels that tunnel messages through existing …

Cache me outside: A new look at DNS cache probing

A McGregor, P Gill, N Weaver - Proc. Passive and Active …, 2021 - books.google.com
DNS cache probing infers whether users of a DNS resolver have recently issued a query for
a domain name, by determining whether the corresponding resource record (RR) is present …

Understanding Routing-Induced Censorship Changes Globally

A Bhaskar, P Pearce - arXiv preprint arXiv:2406.19304, 2024 - arxiv.org
Internet censorship is pervasive, with significant effort dedicated to understanding what is
censored, and where. Prior censorship work however have identified significant …

A First Look At IPv6 Hypergiant Infrastructure

F Hilal, P Sattler, K Vermeulen, O Gasser - Proceedings of the ACM on …, 2024 - dl.acm.org
Today's Internet is dominated by a small number of companies which are responsible for a
large fraction of Internet traffic. These so called" hypergiants" make use of off-nets to deploy …

Out in the Open: On the Implementation of Mobile App Filtering in India

D Gosain, K Singh, R Sharma, J Suresh Babu… - … Conference on Passive …, 2024 - Springer
In this paper, we present the first comprehensive study highlighting the evolving mobile app
filtering within India. We study the recent mobile app blocking in India and describe in detail …