[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Anti-phishing: A comprehensive perspective

G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …

[PDF][PDF] The Security Impact of HTTPS Interception.

Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan… - NDSS, 2017 - git.safemobile.org
As HTTPS deployment grows, middlebox and antivirus products are increasingly
intercepting TLS connections to retain visibility into network traffic. In this work, we present a …

Coming of age: A longitudinal study of tls deployment

P Kotzias, A Razaghpanah, J Amann… - Proceedings of the …, 2018 - dl.acm.org
The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted
communication on the Internet. However, it has been plagued by a number of different …

Mission accomplished? HTTPS security after DigiNotar

J Amann, O Gasser, Q Scheitle, L Brent… - Proceedings of the …, 2017 - dl.acm.org
Driven by CA compromises and the risk of man-in-the-middle attacks, new security features
have been added to TLS, HTTPS, and the web PKI over the past five years. These include …

Studying TLS usage in Android apps

A Razaghpanah, AA Niaki… - Proceedings of the 13th …, 2017 - dl.acm.org
Transport Layer Security (TLS), has become the de-facto standard for secure Internet
communication. When used correctly, it provides secure data transfer, but used incorrectly, it …

{LZR}: Identifying unexpected internet services

L Izhikevich, R Teixeira, Z Durumeric - 30th USENIX Security …, 2021 - usenix.org
Internet-wide scanning is a commonly used research technique that has helped uncover
real-world attacks, find cryptographic weaknesses, and understand both operator and …

Tracking certificate misissuance in the wild

D Kumar, Z Wang, M Hyder, J Dickinson… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Certificate Authorities (CAs) regularly make mechanical errors when issuing certificates. To
quantify these errors, we introduce ZLint, a certificate linter that codifies the policies set forth …

Towards a complete view of the certificate ecosystem

B VanderSloot, J Amann, M Bernhard… - Proceedings of the …, 2016 - dl.acm.org
The HTTPS certificate ecosystem has been of great interest to the measurement and security
communities. Without any ground truth, researchers have attempted to study this PKI from a …

{End-to-End} measurements of email spoofing attacks

H Hu, G Wang - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
Spear phishing has been a persistent threat to users and organizations, and yet email
providers still face key challenges to authenticate incoming emails. As a result, attackers can …