Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Hugo Jonker"'
Publikováno v:
Fass, A.; Shafiq, Z. (ed.), MADWeb 2023: Workshop on Measurements, Attacks, and Defenses for the Web March 3, 2023 San Diego, CA, USA, pp. 1-11
Contains fulltext : 293144.pdf (Publisher’s version ) (Open Access) MADWeb 2023
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7c0bc6ca7eddb7dc6aa2b3ba8cad1f9d
Publikováno v:
Forensic Science International: Digital Investigation, 38:301125. Elsevier Advanced Technology
van der Meer, V, Jonker, H L & van den Bos, J 2021, ' A Contemporary Investigation of NTFS File Fragmentation ', Forensic Science International: Digital Investigation, vol. 38, 301125 . https://doi.org/10.1016/j.fsidi.2021.301125
Forensic Science International, 38, Supplement, pp. 1-11
Forensic Science International, 38, 1-11
van der Meer, V, Jonker, H L & van den Bos, J 2021, ' A Contemporary Investigation of NTFS File Fragmentation ', Forensic Science International: Digital Investigation, vol. 38, 301125 . https://doi.org/10.1016/j.fsidi.2021.301125
Forensic Science International, 38, Supplement, pp. 1-11
Forensic Science International, 38, 1-11
There is a significant amount of research in digital forensics into analyzing file fragments or reconstructing fragmented data. At the same time, there are no recent measurements of fragmentation on current, in-use computer systems. To close this gap
Publikováno v:
RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, 115-128
STARTPAGE=115;ENDPAGE=128;TITLE=RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses
Ferreira Torres, C, Jonker, H L & State, R 2022, Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts . in RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses . Association for Computing Machinery (ACM), pp. 115-128, 25th International Symposium on Research in Attacks, Intrusions and Defenses, Limassol, Cyprus, 26/10/22 . https://doi.org/10.1145/3545948.3545975
STARTPAGE=115;ENDPAGE=128;TITLE=RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses
Ferreira Torres, C, Jonker, H L & State, R 2022, Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts . in RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses . Association for Computing Machinery (ACM), pp. 115-128, 25th International Symposium on Research in Attacks, Intrusions and Defenses, Limassol, Cyprus, 26/10/22 . https://doi.org/10.1145/3545948.3545975
Fixing bugs is easiest by patching source code. However, source code is not always available: only 0.3% of the ∼49M smart contracts that are currently deployed on Ethereum have their source code publicly available. Moreover, since contracts may cal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dcad8641e3f801e31dedacfb8d575606
http://orbilu.uni.lu/handle/10993/51740
http://orbilu.uni.lu/handle/10993/51740
Publikováno v:
Goßen, D, Jonker, H L, Karsch, S, Krumnow, B & Roefs, D 2021, HLISA : towards a more reliable measurement tool . in IMC '21 : Proceedings of the 21st ACM Internet Measurement Conference . pp. 380–389, The 21st ACM Internet Measurement Conference, New York, United States, 2/11/21 . https://doi.org/10.1145/3487552.3487843
Internet Measurement Conference
IMC '21: Proceedings of the 21st ACM Internet Measurement Conference
IMC '21
Internet Measurement Conference
IMC '21: Proceedings of the 21st ACM Internet Measurement Conference
IMC '21
Automated browsers (web bots) are an invaluable tool for studying the web. However, research has shown that web bots can be distinguished from regular browsers and that they may be served different content as a consequence. This undermines their util
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8330498ae5c81f5928b2ed9cb35940da
https://hdl.handle.net/1820/6b6605ee-c246-40cb-beee-092b2526b1aa
https://hdl.handle.net/1820/6b6605ee-c246-40cb-beee-092b2526b1aa
Publikováno v:
EuroS&P Workshops
Maffei, M. (ed.), EuroS&PW 2021: 2021 IEEE European Symposium on Security and Privacy Workshops, Virtual Conference, pp. 49-59
IEEE European Symposium on Security and Privacy Workshops: (EuroS&PW), 49-59
STARTPAGE=49;ENDPAGE=59;TITLE=IEEE European Symposium on Security and Privacy Workshops
Compagna, L, Jonker, H L, Krochewski, J, Krumnow, B & Sahin, M 2021, A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence . in IEEE European Symposium on Security and Privacy Workshops : (EuroS &PW) . IEEE, pp. 49-59, 2021 IEEE European Symposium on Security and Privacy Workshops, Vienna, Austria, 6/09/21 . https://doi.org/10.1109/eurospw54576.2021.00012
Maffei, M. (ed.), EuroS&PW 2021: 2021 IEEE European Symposium on Security and Privacy Workshops, Virtual Conference, pp. 49-59
IEEE European Symposium on Security and Privacy Workshops: (EuroS&PW), 49-59
STARTPAGE=49;ENDPAGE=59;TITLE=IEEE European Symposium on Security and Privacy Workshops
Compagna, L, Jonker, H L, Krochewski, J, Krumnow, B & Sahin, M 2021, A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence . in IEEE European Symposium on Security and Privacy Workshops : (EuroS &PW) . IEEE, pp. 49-59, 2021 IEEE European Symposium on Security and Privacy Workshops, Vienna, Austria, 6/09/21 . https://doi.org/10.1109/eurospw54576.2021.00012
The SameSite cookie attribute was introduced to prevent Cross-site Request Forgery (CSRF) attacks. Major browsers support SameSite functionality since 2016. Since 2020, browsers enforce it by default. These developments sometimes have been celebrated
Publikováno v:
Computers & Security, 111, 1-18
Computers & Security, 111:102472. Elsevier Advanced Technology
Calzavara, S, Jonker, H L, Krumnow, B & Rabitti, A 2021, ' Measuring Web Session Security at Scale ', Computers & Security, vol. 111, 102472 . https://doi.org/10.1016/j.cose.2021.102472
Computers & Security, 111, pp. 1-18
Computers & Security, 111:102472. Elsevier Advanced Technology
Calzavara, S, Jonker, H L, Krumnow, B & Rabitti, A 2021, ' Measuring Web Session Security at Scale ', Computers & Security, vol. 111, 102472 . https://doi.org/10.1016/j.cose.2021.102472
Computers & Security, 111, pp. 1-18
Session management is a particularly delicate component of web applications, which might suffer from a range of severe security issues, including impersonation attacks. Unfortunately, the scope and significance of prior work on web session security i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::280bcf73793f884f2ebb4c2c17514d67
http://hdl.handle.net/2066/238037
http://hdl.handle.net/2066/238037
Publikováno v:
Proceedings MADWeb 2020: Workshop on Measurements, Attacks, and Defenses for the Web, February 23, 2020, San Diego, California
Proceedings MADWeb 2020
Jaeger, T. (ed.), MADWEB'20: Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web, 2020 23 February 2020, San Diego, CA, USA, 1-10. Reston : Internet Society
STARTPAGE=1;ENDPAGE=10;TITLE=Jaeger, T. (ed.), MADWEB'20: Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web, 2020 23 February 2020, San Diego, CA, USA
Jonker, H L, Karsch, S, Krumnow, B & Sleegers, M 2020, Shepherd : A Generic Approach to Automating Website Login . in Proceedings MADWeb 2020 : Workshop on Measurements, Attacks, and Defenses for the Web, February 23, 2020, San Diego, California . Internet Society, Reston, The Network and Distributed System Security Symposium 2020, San Diego, California, United States, 23/02/20 . https://doi.org/10.14722/madweb.2020.23008
Jaeger, T. (ed.), MADWEB'20: Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web, 2020 23 February 2020, San Diego, CA, USA, pp. 1-10
Proceedings MADWeb 2020
Jaeger, T. (ed.), MADWEB'20: Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web, 2020 23 February 2020, San Diego, CA, USA, 1-10. Reston : Internet Society
STARTPAGE=1;ENDPAGE=10;TITLE=Jaeger, T. (ed.), MADWEB'20: Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web, 2020 23 February 2020, San Diego, CA, USA
Jonker, H L, Karsch, S, Krumnow, B & Sleegers, M 2020, Shepherd : A Generic Approach to Automating Website Login . in Proceedings MADWeb 2020 : Workshop on Measurements, Attacks, and Defenses for the Web, February 23, 2020, San Diego, California . Internet Society, Reston, The Network and Distributed System Security Symposium 2020, San Diego, California, United States, 23/02/20 . https://doi.org/10.14722/madweb.2020.23008
Jaeger, T. (ed.), MADWEB'20: Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web, 2020 23 February 2020, San Diego, CA, USA, pp. 1-10
To gauge adoption of web security measures, largescale testing of website security is needed. However, the diversity of modern websites makes a structured approach to testing a daunting task. This is especially a problem with respect to logging in: t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::36832e12d14d8dde21bff0758b1a2c0e
https://www.ndss-symposium.org/wp-content/uploads/2020/02/MADWeb2020_Proceedings_Front_Matter.pdf
https://www.ndss-symposium.org/wp-content/uploads/2020/02/MADWeb2020_Proceedings_Front_Matter.pdf
Autor:
Vincent van der Meer, Harm van Beek, Hugo Jonker, Guy Dols, Jeroen van den Bos, Marko van Eekelen
Publikováno v:
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, pp. 1-6
2019 IEEE International Workshop on Information Forensics and Security (WIFS): Proceedings, 1-6
STARTPAGE=1;ENDPAGE=6;TITLE=2019 IEEE International Workshop on Information Forensics and Security (WIFS)
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, 1-6. Los Alamitos : IEEE
STARTPAGE=1;ENDPAGE=6;TITLE=WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December
van der Meer, V, Jonker, H, Dols, G, van Beek, H, van den Bos, J & van Eekelen, M 2020, File Fragmentation in the Wild : A Privacy-Friendly Approach . in 2019 IEEE International Workshop on Information Forensics and Security (WIFS) : Proceedings . IEEE, Delft, pp. 1-6, 2019 IEEE International Workshop on Information Forensics and Security, Delft, Netherlands, 9/12/19 . https://doi.org/10.1109/WIFS47025.2019.9034981
WIFS
2019 IEEE International Workshop on Information Forensics and Security (WIFS): Proceedings, 1-6
STARTPAGE=1;ENDPAGE=6;TITLE=2019 IEEE International Workshop on Information Forensics and Security (WIFS)
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, 1-6. Los Alamitos : IEEE
STARTPAGE=1;ENDPAGE=6;TITLE=WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December
van der Meer, V, Jonker, H, Dols, G, van Beek, H, van den Bos, J & van Eekelen, M 2020, File Fragmentation in the Wild : A Privacy-Friendly Approach . in 2019 IEEE International Workshop on Information Forensics and Security (WIFS) : Proceedings . IEEE, Delft, pp. 1-6, 2019 IEEE International Workshop on Information Forensics and Security, Delft, Netherlands, 9/12/19 . https://doi.org/10.1109/WIFS47025.2019.9034981
WIFS
Digital forensic tooling should be based on reference data. Such reference data can be gathered by measuring a baseline, e.g. from volunteers. However, the privacy provisions in digital forensics tools are typically tailored for criminal investigatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6fd9c312e7c8f2690cb89a511b23b239
https://hdl.handle.net/2066/219343
https://hdl.handle.net/2066/219343
Publikováno v:
CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2589-2591
STARTPAGE=2589;ENDPAGE=2591;TITLE=CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Ferreira Torres, C, Baden, M, Norvill, R & Jonker, H 2019, ÆGIS : Smart Shielding of Smart Contracts . in CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery (ACM), New York, NY, pp. 2589-2591, 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom, 11/11/19 . https://doi.org/10.1145/3319535.3363263
CCS
STARTPAGE=2589;ENDPAGE=2591;TITLE=CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Ferreira Torres, C, Baden, M, Norvill, R & Jonker, H 2019, ÆGIS : Smart Shielding of Smart Contracts . in CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery (ACM), New York, NY, pp. 2589-2591, 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom, 11/11/19 . https://doi.org/10.1145/3319535.3363263
CCS
In recent years, smart contracts have suffered major exploits, losing millions of dollars. Unlike traditional programs, smart contracts cannot be updated once deployed. Though various tools were proposed to detect vulnerable smart contracts, they all
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::48e560d29ad36bca7eaaf7bfda8a8918
https://research.ou.nl/en/publications/0f53d051-a01c-4b0f-804f-8a476ddf32f0
https://research.ou.nl/en/publications/0f53d051-a01c-4b0f-804f-8a476ddf32f0
Publikováno v:
Journal of Algorithms, 64(2-3), 89-105. Academic Press Inc.
Privacy is a necessary requirement for voting. Without privacy, voters can be forced to vote in specific ways, and the forcing party can check their compliance. But offering privacy does not suffice: if a voter can reduce her privacy, an attacker can