Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Christian Kreibich"'
Autor:
Narseo Vallina-Rodriguez, Christian Kreibich, Abbas Razaghpanah, Mark Allman, Srikanth Sundaresan, Phillipa Gill, Rishab Nithyanand
Publikováno v:
IMDEA Networks Institute Digital Repository
instname
IMDEA Networks Institute
NDSS
instname
IMDEA Networks Institute
NDSS
Third-party services form an integral part of the mobile ecosystem: they ease application development and enable features such as analytics, social network integration, and app monetization through ads. However, aided by the general opacity of mobile
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6b4e28241dcb643549df742dcd6ef480
http://hdl.handle.net/20.500.12761/507
http://hdl.handle.net/20.500.12761/507
Publikováno v:
ACSAC
Web service operators set up reverse proxies to interpose the communication between clients and origin servers for load-balancing traffic across servers, caching content, and filtering attacks. Silent reverse proxies, which do not reveal their proxy
Autor:
Stefan Savage, Kirill Levchenko, Geoffrey M. Voelker, Brandon Enright, Chris Kanich, Vern Paxson, Christian Kreibich
Publikováno v:
ACM Conference on Computer and Communications Security
Spam-based marketing is a curious beast. We all receive the advertisements---"Excellent hardness is easy!"---but few of us have encountered a person who admits to following through on this offer and making a purchase. And yet, the relentlessness by w
Autor:
Randy Bush, Anja Feldmann, Christian Kreibich, Narseo Vallina-Rodriguez, Mark Allman, Nicholas Weaver, Vern Paxson, Florian Wohlfart, Philipp M. Richter
Publikováno v:
IMDEA Networks Institute Digital Repository
IMDEA Networks Institute
instname
IMDEA Networks Institute
instname
As ISPs face IPv4 address scarcity they increasingly turn to network address translation (NAT) to accommodate the address needs of their customers. Recently, ISPs have moved beyond employing NATs only directly at individual customers and instead begu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a132ae31b8762b43a285d9a927d34cab
http://hdl.handle.net/20.500.12761/310
http://hdl.handle.net/20.500.12761/310
Publikováno v:
HotMiddlebox@SIGCOMM
HTTP header enrichment allows mobile operators to annotate HTTP connections via the use of a wide range of request headers. Operators employ proxies to introduce such headers for operational purposes, and---as recently widely publicized---also to ass
Autor:
Narseo Vallina-Rodriguez, Nicholas Weaver, Vern Paxson, Christian Kreibich, Srikanth Sundaresan
Publikováno v:
MobiSys
Cellular network performance is often viewed as primarily dominated by the radio technology. However, reality proves more complex: mobile operators deploy and configure their networks in different ways, and sometimes establish network sharing agreeme
Autor:
Christian Kreibich, Jon Crowcroft
Publikováno v:
ACM SIGCOMM Computer Communication Review. 36:57-62
Only three hundred sixty four days left until the Sigcomm deadline. Only three hundred sixty three days left until the Sigcomm deadline. Only three hundred sixty two days left until the Sigcomm deadline. Only three hundred sixty one days left until t
Autor:
Christian Kreibich, Jon Crowcroft
Publikováno v:
ACM SIGCOMM Computer Communication Review. 34:51-56
This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol conformance checks on multiple levels in the protocol hierarchy to networ
Publikováno v:
CoNEXT
The security of today's Web rests in part on the set of X.509 certificate authorities trusted by each user's browser. Users generally do not themselves configure their browser's root store but instead rely upon decisions made by the suppliers of eith
Autor:
Christian Kreibich, Vern Paxson, Chris Grier, Matthew Thomas, Scott Hollenbeck, Nick Feamster, Shuang Hao
Publikováno v:
Internet Measurement Conference
Spammers register a tremendous number of domains to evade blacklisting and takedown efforts. Current techniques to detect such domains rely on crawling spam URLs or monitoring lookup traffic. Such detection techniques are only effective after the spa