A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant {APIs} in {WeChat}

C Wang, Y Zhang, Z Lin - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The past few years have witnessed a boom of mobile super apps, which are the apps
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …

Towards measuring supply chain attacks on package managers for interpreted languages

R Duan, O Alrawi, RP Kasturi, R Elder… - arXiv preprint arXiv …, 2020 - arxiv.org
Package managers have become a vital part of the modern software development process.
They allow developers to reuse third-party code, share their own code, minimize their …

Cookie swap party: Abusing first-party cookies for web tracking

Q Chen, P Ilia, M Polychronakis… - Proceedings of the Web …, 2021 - dl.acm.org
As a step towards protecting user privacy, most web browsers perform some form of third-
party HTTP cookie blocking or periodic deletion by default, while users typically have the …

zkpi: Proving lean theorems in zero-knowledge

E Laufer, A Ozdemir, D Boneh - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Interactive theorem provers (ITPs), such as Lean and Coq, can express formal proofs for a
large category of theorems, from abstract math to software correctness. Consider Alice who …

CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation

J Yu, S Li, J Zhu, Y Cao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Extensions complement web browsers with additional functionalities and also bring new
vulnerability venues, allowing privilege escalations from adversarial web pages to use …

Doublex: Statically detecting vulnerable data flows in browser extensions at scale

A Fass, DF Somé, M Backes, B Stock - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Browser extensions are popular to enhance users' browsing experience. By design, they
have access to security-and privacy-critical APIs to perform tasks that web applications …

Fingerprinting in style: Detecting browser extensions via injected style sheets

P Laperdrix, O Starov, Q Chen, A Kapravelos… - 30th USENIX Security …, 2021 - usenix.org
Browser extensions enhance the web experience and have seen great adoption from users
in the past decade. At the same time, past research has shown that online trackers can use …

You've changed: Detecting malicious browser extensions through their update deltas

N Pantelaios, N Nikiforakis, A Kapravelos - Proceedings of the 2020 …, 2020 - dl.acm.org
In this paper, we conduct the largest to-date analysis of browser extensions, by investigating
922,684 different extension versions collected in the past six years, and using this data to …