Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Dennis Tatang"'
Publikováno v:
RAID
Email is still one of the most common ways of communication in our digital world, the underlying Simple Mail Transport Protocol (SMTP) is crucial for our information society. Back when SMTP was developed, security goals for the exchanged messages did
Publikováno v:
Journal of Computer Security. 27:459-481
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030808242
DIMVA
DIMVA
Attackers use various techniques to lure victims to malicious domains. A typical approach is to generate domains which look similar to well-known ones so that a confused victim is tricked into visiting the domain. An important attack technique in pra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1b7416dd03953162bf106639a29157a
https://doi.org/10.1007/978-3-030-80825-9_4
https://doi.org/10.1007/978-3-030-80825-9_4
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030808242
DIMVA
DIMVA
Nowadays, email is still the most popular communication channel of the Internet. It is based on Simple Mail Transfer Protocol (SMTP), which lacks basic security properties such as confidentiality and authenticity despite its ever-growing importance.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::280168de217ec41096f3759e6563e330
https://doi.org/10.1007/978-3-030-80825-9_18
https://doi.org/10.1007/978-3-030-80825-9_18
Publikováno v:
NDSS
Over the years, browsers have adopted an ever-increasing number of client-enforced security policies deployed through HTTP headers. Such mechanisms are fundamental for web application security, and usually deployed on a per-page basis. This, however,
Publikováno v:
AsiaCCS
Ruhr-Universität Bochum
Ruhr-Universität Bochum
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation's definition of personal
Publikováno v:
Computer Security ISBN: 9783030420475
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS
DNS rebinding is an attack technique know for more than 20 years, which is experiencing a revival caused by the ever-increasing networking of Internet of Things (IoT) devices. Thus, the potential attack surface is growing rapidly, and this paper show
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6bda6fc35291da87d4e1aace677c6209
https://doi.org/10.1007/978-3-030-42048-2_25
https://doi.org/10.1007/978-3-030-42048-2_25
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030590123
ESORICS (2)
ESORICS (2)
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::94e3154df777e3beae099cff241bffd4
https://doi.org/10.1007/978-3-030-59013-0_14
https://doi.org/10.1007/978-3-030-59013-0_14
Publikováno v:
eCrime
The domain name system (DNS) is a crucial backbone of the Internet and millions of new domains are created on a daily basis. While the vast majority of these domains are legitimate, adversaries also register new hostnames to carry out nefarious purpo
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030314996
DPM/CBT@ESORICS
DPM/CBT@ESORICS
Online tracking has mostly been studied by passively measuring the presence of tracking services on websites (i) without knowing what data these services collect, (ii) the reasons for which specific purposes it is collected, (iii) or if the used prac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7e2c12bedd89a73a7d0c713a26cb6114
https://doi.org/10.1007/978-3-030-31500-9_5
https://doi.org/10.1007/978-3-030-31500-9_5