Zobrazeno 1 - 10
of 32
pro vyhledávání: '"LEVIN, DAVE"'
Influencer VPN ads (sponsored segments) on YouTube often disseminate misleading information about both VPNs, and security & privacy more broadly. However, it remains unclear how (or whether) these ads affect users' perceptions and knowledge about VPN
Externí odkaz:
http://arxiv.org/abs/2406.13017
Autor:
Rye, Erik, Levin, Dave
Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that Apple's WPS can be abused to create a privacy threat on a global scale. We pre
Externí odkaz:
http://arxiv.org/abs/2405.14975
Autor:
Böck, Leon, Sundermann, Valentin, Fusari, Isabella, Karuppayah, Shankar, Mühlhäuser, Max, Levin, Dave
Since the burgeoning days of IoT, Mirai has been established as the canonical IoT botnet. Not long after the public release of its code, researchers found many Mirai variants compete with one another for many of the same vulnerable hosts. Over time,
Externí odkaz:
http://arxiv.org/abs/2309.01130
Autor:
Rye, Erik, Levin, Dave
Today's network measurements rely heavily on Internet-wide scanning, employing tools like ZMap that are capable of quickly iterating over the entire IPv4 address space. Unfortunately, IPv6's vast address space poses an existential threat for Internet
Externí odkaz:
http://arxiv.org/abs/2307.15057
Autor:
Nourin, Sadia, Tran, Van, Jiang, Xi, Bock, Kevin, Feamster, Nick, Hoang, Nguyen Phong, Levin, Dave
Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters without Borders due to its extensively censored Internet and strictly regulated information control policies. Existing reports of filtering in Turkmenistan rely
Externí odkaz:
http://arxiv.org/abs/2304.04835
The popularity of Python has risen rapidly over the past 15 years. It is a major language in some of the most exciting technologies today. This popularity has led to a large ecosystem of third-party packages available via the pip package registry whi
Externí odkaz:
http://arxiv.org/abs/2102.06301
Autor:
Parker, James, Hicks, Michael, Ruef, Andrew, Mazurek, Michelle L., Levin, Dave, Votipka, Daniel, Mardziel, Piotr, Fulton, Kelsey R.
Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it, Break-it, Fix-it (BIBIFI) contest, which aims to assess the ability to securely build software, not just break it. In BIBIFI, teams build
Externí odkaz:
http://arxiv.org/abs/1907.01679
Autor:
Ruef, Andrew, Hicks, Michael, Parker, James, Levin, Dave, Mazurek, Michelle L., Mardziel, Piotr
Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it Break-it Fix-it BIBIFI contest which aims to assess the ability to securely build software not just break it. In BIBIFI teams build specifi
Externí odkaz:
http://arxiv.org/abs/1606.01881
Autor:
Pradeep, Amogh, Paracha, Muhammad Talha, Bhowmick, Protick, Davanian, Ali, Razaghpanah, Abbas, Chung, Taejoong, Lindorfer, Martina, Vallina-Rodriguez, Narseo, Levin, Dave, Choffnes, David
Publikováno v:
Proceedings of the 22nd ACM Internet Measurement Conference
Proceedings of the 22nc ACM Internet Measurement Conference (IMC)
Proceedings of the 22nc ACM Internet Measurement Conference (IMC)
TLS certificate pinning is a security mechanism used by applications (apps) to protect their network traffic against malicious certificate authorities (CAs), in-path monitoring, and other TLS tampering. Pinning can provide enhanced security to defend
Autor:
Liang Zhang, Choffnes, David, Dumitras, Tudor, Levin, Dave, Mislove, Alan, Schulman, Aaron, Wilson, Christo
Publikováno v:
Communications of the ACM; Mar2018, Vol. 61 Issue 3, p109-116, 8p, 1 Diagram, 7 Graphs