The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted communication on the Internet. However, it has been plagued by a number of different …
abstract As the Internet has transformed into a critical infrastructure, society has become more vulnerable to its security flaws. Despite substantial efforts to address many of these …
J Bushart, C Rossow - 10th USENIX Workshop on Free and Open …, 2020 - usenix.org
DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user privacy by hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …
B Anderson, D McGrew - 2017 IEEE Conference on …, 2017 - ieeexplore.ieee.org
Passive operating system fingerprinting reveals valuable information to the defenders of heterogeneous private networks; at the same time, attackers can use fingerprinting to …
B Anderson, D McGrew - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
The Transport Layer Security (TLS) protocol has evolved in response to different attacks and is increasingly relied on to secure Internet communications. Web browsers have led the …
Abstract Collecting metadata from Transport Layer Security (TLS) servers on a large scale allows to draw conclusions about their capabilities and configuration. This provides not only …
AE Gattiker, W Maly - Proceedings International Test …, 1997 - ieeexplore.ieee.org
Analysis of IC technology trends indicates that Iddq testing may be approaching its limits of applicability. The new concept of the current signature may expand this limit under the …
Active measurements can be used to collect server characteristics on a large scale. This kind of metadata can help discovering hidden relations and commonalities among server …
B Anderson, D McGrew - arXiv preprint arXiv:2009.01939, 2020 - arxiv.org
Network fingerprinting is used to identify applications, provide insight into network traffic, and detect malicious activity. With the broad adoption of TLS, traditional fingerprinting techniques …