[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions

JPA Yaacoub, HN Noura, O Salman - Internet of Things and Cyber-Physical …, 2023 - Elsevier
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …

The dangers of human touch: fingerprinting browser extensions through user actions

K Solomos, P Ilia, S Karami, N Nikiforakis… - 31st USENIX Security …, 2022 - usenix.org
Browser extension fingerprinting has garnered considerable attention recently due to the
twofold privacy loss that it incurs. Apart from facilitating tracking by augmenting browser …

The clock is still ticking: Timing attacks in the modern web

T Van Goethem, W Joosen, N Nikiforakis - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Web-based timing attacks have been known for over a decade, and it has been shown that,
under optimal network conditions, an adversary can use such an attack to obtain information …

[PDF][PDF] Tales of favicons and caches: Persistent tracking in modern browsers

K Solomos, J Kristoff, C Kanich, J Polakis - Network and Distributed …, 2021 - par.nsf.gov
The privacy threats of online tracking have garnered considerable attention in recent years
from researchers and practitioners. This has resulted in users becoming more …

Web-based attacks to discover and control local IoT devices

G Acar, DY Huang, F Li, A Narayanan… - Proceedings of the 2018 …, 2018 - dl.acm.org
In this paper, we present two web-based attacks against local IoT devices that any malicious
web page or third-party script can perform, even when the devices are behind NATs. In our …

Sok: Exploring current and future research directions on xs-leaks through an extended formal model

T Van Goethem, G Franken, I Sanchez-Rola… - Proceedings of the …, 2022 - dl.acm.org
A web visit typically consists of the browser rendering a dynamically generated response
that is specifically tailored to the user. This generation of responses based on the currently …

Pride and prejudice in progressive web apps: Abusing native app-like features in web applications

J Lee, H Kim, J Park, I Shin, S Son - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Progressive Web App (PWA) is a new generation of Web application designed to provide
native app-like browsing experiences even when a browser is offline. PWAs make full use of …

[PDF][PDF] Awakening the web's sleeper agents: Misusing service workers for privacy leakage

S Karami, P Ilia, J Polakis - Network and Distributed System Security …, 2021 - par.nsf.gov
Service workers are a powerful technology supported by all major modern browsers that can
improve users' browsing experience by offering capabilities similar to those of native …

Browser history {re: visited}

M Smith, C Disselkoen, S Narayan, F Brown… - 12th USENIX Workshop …, 2018 - usenix.org
We present four new history sniffing attacks. Our attacks fit into two classical categories—
visited-link attacks and cache-based attacks—but abuse new, modern browser features (eg …

Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers

L Knittel, C Mainka, M Niemietz, DT Noß… - Proceedings of the 2021 …, 2021 - dl.acm.org
Cross-Site Leaks (XS-Leaks) describe a client-side bug that allows an attacker to collect
side-channel information from a cross-origin HTTP resource. They are a significant threat to …