[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

A survey of browser fingerprint research and application

D Zhang, J Zhang, Y Bu, B Chen… - … and Mobile Computing, 2022 - Wiley Online Library
With the development of modern browsing, the convenience brought by rich browser
features has also produced a large number of features, which are called browser …

The cookie hunter: Automated black-box auditing for web authentication and authorization flaws

K Drakonakis, S Ioannidis, J Polakis - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …

Measuring cookies and web privacy in a post-gdpr world

A Dabrowski, G Merzdovnik, J Ullrich… - Passive and Active …, 2019 - Springer
Abstract In response, the European Union has adopted the General Data Protection
Regulation (GDPR), a legislative framework for data protection empowering individuals to …

Device fingerprinting for augmenting web authentication: classification and analysis of methods

F Alaca, PC Van Oorschot - Proceedings of the 32nd annual conference …, 2016 - dl.acm.org
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting
but in the specific context of use for augmenting authentication, providing a state-of-the-art …

Phish in sheep's clothing: Exploring the authentication pitfalls of browser fingerprinting

X Lin, P Ilia, S Solanki, J Polakis - 31st USENIX Security Symposium …, 2022 - usenix.org
As users navigate the web they face a multitude of threats; among them, attacks that result in
account compromise can be particularly devastating. In a world fraught with data breaches …

Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.

M Steffens, C Rossow, M Johns, B Stock - 2019 - publications.cispa.de
The Web has become highly interactive and an important driver for modern life, enabling
information retrieval, social exchange, and online shopping. From the security perspective …

All your dns records point to us: Understanding the security threats of dangling dns records

D Liu, S Hao, H Wang - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but
the record itself has not yet been purged from DNS. In this paper, we shed light on a largely …

O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web

M Ghasemisharif, A Ramesh, S Checkoway… - 27th USENIX Security …, 2018 - usenix.org
Single Sign-On (SSO) allows users to effortlessly navigate the Web and obtain a
personalized experience without the hassle of creating and managing accounts across …