An overview of wireless IoT protocol security in the smart home domain

S Marksteiner, VJE Jiménez, H Valiant… - 2017 Internet of Things …, 2017 - ieeexplore.ieee.org
While the application of IoT in smart technologies becomes more and more proliferated, the
pandemonium of its protocols becomes increasingly confusing. More seriously, severe …

Stack overflow considered harmful? the impact of copy&paste on android application security

F Fischer, K Böttinger, H Xiao… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

[HTML][HTML] Session traversal utilities for NAT (STUN)

J Rosenberg, R Mahy, P Matthews, D Wing - 2008 - rfc-editor.org
RFC 5389: Session Traversal Utilities for NAT (STUN) [RFC Home] [TEXT|PDF|HTML] [Tracker]
[IPR] [Errata] [Info page] Obsoleted by: 8489 PROPOSED STANDARD Updated by: 7350, 8553 …

A stitch in time: Supporting android developers in writingsecure code

DC Nguyen, D Wermke, Y Acar, M Backes… - Proceedings of the …, 2017 - dl.acm.org
Despite security advice in the official documentation and an extensive body of security
research about vulnerabilities and exploits, many developers still fail to write secure Android …

Coming of age: A longitudinal study of tls deployment

P Kotzias, A Razaghpanah, J Amann… - Proceedings of the …, 2018 - dl.acm.org
The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted
communication on the Internet. However, it has been plagued by a number of different …

" I Have No Idea What I'm Doing"-On the Usability of Deploying {HTTPS}

K Krombholz, W Mayer, M Schmiedecker… - 26th USENIX Security …, 2017 - usenix.org
Protecting communication content at scale is a difficult task, and TLS is the protocol most
commonly used to do so. However, it has been shown that deploying it in a truly secure …

[图书][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017 - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and Xin Zhang to consider …

Securing wireless communication in critical infrastructure: challenges and opportunities

J Bodenhausen, C Sorgatz, T Vogt, K Grafflage… - … Conference on Mobile …, 2023 - Springer
Critical infrastructure constitutes the foundation of every society. While traditionally solely
relying on dedicated cable-based communication, this infrastructure rapidly transforms to …

TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication

R Holz, J Amann, O Mehani, M Wachs… - arXiv preprint arXiv …, 2015 - arxiv.org
The majority of electronic communication today happens either via email or chat. Thanks to
the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat …