A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Coming of age: A longitudinal study of tls deployment

P Kotzias, A Razaghpanah, J Amann… - Proceedings of the …, 2018 - dl.acm.org
The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted
communication on the Internet. However, it has been plagued by a number of different …

[PDF][PDF] A comprehensive survey of recent internet measurement techniques for cyber security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Padding ain't enough: Assessing the privacy guarantees of encrypted {DNS}

J Bushart, C Rossow - 10th USENIX Workshop on Free and Open …, 2020 - usenix.org
DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user privacy by
hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …

OS fingerprinting: New techniques and a study of information gain and obfuscation

B Anderson, D McGrew - 2017 IEEE Conference on …, 2017 - ieeexplore.ieee.org
Passive operating system fingerprinting reveals valuable information to the defenders of
heterogeneous private networks; at the same time, attackers can use fingerprinting to …

Tls beyond the browser: Combining end host and network data to understand application behavior

B Anderson, D McGrew - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
The Transport Layer Security (TLS) protocol has evolved in response to different attacks and
is increasingly relied on to secure Internet communications. Web browsers have led the …

Dissectls: A scalable active scanner for tls server configurations, capabilities, and tls fingerprinting

M Sosnowski, J Zirngibl, P Sattler, G Carle - International Conference on …, 2023 - Springer
Abstract Collecting metadata from Transport Layer Security (TLS) servers on a large scale
allows to draw conclusions about their capabilities and configuration. This provides not only …

Current signatures: application

AE Gattiker, W Maly - Proceedings International Test …, 1997 - ieeexplore.ieee.org
Analysis of IC technology trends indicates that Iddq testing may be approaching its limits of
applicability. The new concept of the current signature may expand this limit under the …

Active tls stack fingerprinting: Characterizing tls server deployments at scale

M Sosnowski, J Zirngibl, P Sattler, G Carle… - arXiv preprint arXiv …, 2022 - arxiv.org
Active measurements can be used to collect server characteristics on a large scale. This
kind of metadata can help discovering hidden relations and commonalities among server …

Accurate TLS fingerprinting using destination context and knowledge bases

B Anderson, D McGrew - arXiv preprint arXiv:2009.01939, 2020 - arxiv.org
Network fingerprinting is used to identify applications, provide insight into network traffic, and
detect malicious activity. With the broad adoption of TLS, traditional fingerprinting techniques …