A quic (k) security overview: a literature research on implemented security recommendations

S Tatschner, SN Peters, D Emeis, J Morris… - Proceedings of the 18th …, 2023 - dl.acm.org
Built on top of UDP, the relatively new QUIC protocol serves as the baseline for modern web
protocol stacks. Equipped with a rich feature set, the protocol is defined by a 151 pages …

On reliability of JA3 hashes for fingerprinting mobile applications

P Matoušek, I Burgetová, O Ryšavý, M Victor - Digital Forensics and Cyber …, 2021 - Springer
In recent years, mobile communication has become more secure due to TLS encapsulation.
TLS enhances user security by encrypting transmitted data, on the other hand it limits …

Privacy and Data Protection Challenges in IoT Data and Metadata Processing

PG Chiara - The Internet of Things and EU Law: Cybersecurity …, 2024 - Springer
This chapter casts light on three normative challenges in terms of fundamental rights, in
particular, the right to privacy and the right to the protection of personal data (Arts. 7 and 8 of …

[PDF][PDF] A survey of methods for encrypted network traffic fingerprinting

S Yu, Y Won - Mathematical Biosciences and Engineering, 2023 - aimspress.com
Privacy protection in computer communication is gaining attention because plaintext
transmission without encryption can be eavesdropped on and intercepted. Accordingly, the …

Fuzzing with Stochastic Feedback Processes

K Böttinger - 2019 - mediatum.ub.tum.de
Motivated by the urgent need for secure software we construct new testing methods to
improve current development lifecycles. We connect probability theory with current testing …

Technology Acceptance for Protecting Healthcare Data in the Presence of Rising Secure Sockets Layer/Transport Layer Security Communications: A Generic …

M Zarate - 2021 - search.proquest.com
AbstractHealthcare organizations have the increasing cybersecurity problem of identifying
compromised Internet and network communications as Secure Sockets Layer/Transport …

[PDF][PDF] Mobile Device Fingeprinting

P Matoušek, I Burgetová, M Victor - fit.vut.cz
Network communication of mobile devices provides valuable information about installed
apps, user activities and mobile device usage which can be interesting for network providers …

Unstructured data sensitivity inference for file movement tracking in a network

CA Shenefiel, R Waitman, D McGrew… - US Patent …, 2023 - Google Patents
In one embodiment, a traffic analysis service that monitors a network obtains file metadata
regarding an electronic file. The traffic analysis service determines a sensitivity score for the …

Unstructured data sensitivity inference for file movement tracking in a network

CA Shenefiel, R Waitman, D McGrew… - US Patent …, 2022 - Google Patents
In one embodiment, a traffic analysis service that monitors a network obtains file metadata
regarding an electronic file. The traffic analysis service determines a sensitivity score for the …

Security Investigation in Encrypted Environment

F Kilic - 2017 - mediatum.ub.tum.de
Verschlüsselung wird gegenwärtig von einer Vielzahl von Anwendungen genutzt, um
vertrauliche Daten in der Netzwerkkommunikation zu schützen. Da die derzeit verfügbaren …