A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

A survey on web application penetration testing

EA Altulaihan, A Alismail, M Frikha - Electronics, 2023 - mdpi.com
Websites are becoming increasingly effective communication tools. Nevertheless, web
applications are vulnerable to attack and can give attackers access to sensitive information …

Small world with high risks: A study of security threats in the npm ecosystem

M Zimmermann, CA Staicu, C Tenny… - 28th USENIX Security …, 2019 - usenix.org
The popularity of JavaScript has lead to a large ecosystem of third-party packages available
via the npm software package registry. The open nature of npm has boosted its growth …

On the impact of security vulnerabilities in the npm package dependency network

A Decan, T Mens, E Constantinou - Proceedings of the 15th international …, 2018 - dl.acm.org
Security vulnerabilities are among the most pressing problems in open source software
package libraries. It may take a long time to discover and fix vulnerabilities in packages. In …

Demystifying the vulnerability propagation and its evolution via dependency trees in the npm ecosystem

C Liu, S Chen, L Fan, B Chen, Y Liu… - Proceedings of the 44th …, 2022 - dl.acm.org
Third-party libraries with rich functionalities facilitate the fast development of JavaScript
software, leading to the explosive growth of the NPM ecosystem. However, it also brings …

Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors

U Iqbal, S Englehardt, Z Shafiq - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Browser fingerprinting is an invasive and opaque stateless tracking technique. Browser
vendors, academics, and standards bodies have long struggled to provide meaningful …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

Keep me updated: An empirical study of third-party library updatability on android

E Derr, S Bugiel, S Fahl, Y Acar, M Backes - Proceedings of the 2017 …, 2017 - dl.acm.org
Third-party libraries in Android apps have repeatedly been shown to be hazards to the
users' privacy and an amplification of their host apps' attack surface. A particularly …

An empirical study of real-world webassembly binaries: Security, languages, use cases

A Hilbig, D Lehmann, M Pradel - Proceedings of the web conference …, 2021 - dl.acm.org
WebAssembly has emerged as a low-level language for the web and beyond. Despite its
popularity in different domains, little is known about WebAssembly binaries that occur in the …

A qualitative study of dependency management and its security implications

I Pashchenko, DL Vu, F Massacci - … of the 2020 ACM SIGSAC conference …, 2020 - dl.acm.org
Several large scale studies on the Maven, NPM, and Android ecosystems point out that
many developers do not often update their vulnerable software libraries thus exposing the …