Zobrazeno 1 - 10
of 97
pro vyhledávání: '"POLYCHRONAKIS, MICHALIS"'
Most online communications rely on DNS to map domain names to their hosting IP address(es). Previous work has shown that DNS-based network interference is widespread due to the unencrypted and unauthenticated nature of the original DNS protocol. In a
Externí odkaz:
http://arxiv.org/abs/2202.00663
Autor:
Hoang, Nguyen Phong, Niaki, Arian Akhavan, Dalek, Jakub, Knockel, Jeffrey, Lin, Pellaeon, Marczak, Bill, Crete-Nishihata, Masashi, Gill, Phillipa, Polychronakis, Michalis
The DNS filtering apparatus of China's Great Firewall (GFW) has evolved considerably over the past two decades. However, most prior studies of China's DNS filtering were performed over short time periods, leading to unnoticed changes in the GFW's beh
Externí odkaz:
http://arxiv.org/abs/2106.02167
Although the security benefits of domain name encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their positive impact on user privacy is weakened by--the still exposed--IP address in
Externí odkaz:
http://arxiv.org/abs/2102.08332
Understanding web co-location is essential for various reasons. For instance, it can help one to assess the collateral damage that denial-of-service attacks or IP-based blocking can cause to the availability of co-located web sites. However, it has b
Externí odkaz:
http://arxiv.org/abs/2004.04623
Centralized DNS over HTTPS/TLS (DoH/DoT) resolution, which has started being deployed by major hosting providers and web browsers, has sparked controversy among Internet activists and privacy advocates due to several privacy concerns. This design dec
Externí odkaz:
http://arxiv.org/abs/2001.08901
Autor:
Hoang, Nguyen Phong, Niaki, Arian Akhavan, Borisov, Nikita, Gill, Phillipa, Polychronakis, Michalis
As Internet users have become more savvy about the potential for their Internet communication to be observed, the use of network traffic encryption technologies (e.g., HTTPS/TLS) is on the rise. However, even when encryption is enabled, users leak in
Externí odkaz:
http://arxiv.org/abs/1911.00563
Publikováno v:
In Computers & Security September 2023 132
The prevalence of Internet censorship has prompted the creation of several measurement platforms for monitoring filtering activities. An important challenge faced by these platforms revolves around the trade-off between depth of measurement and bread
Externí odkaz:
http://arxiv.org/abs/1907.07120
Autor:
Papadopoulos, Panagiotis, Ilia, Panagiotis, Polychronakis, Michalis, Markatos, Evangelos P., Ioannidis, Sotiris, Vasiliadis, Giorgos
The proliferation of web applications has essentially transformed modern browsers into small but powerful operating systems. Upon visiting a website, user devices run implicitly trusted script code, the execution of which is confined within the brows
Externí odkaz:
http://arxiv.org/abs/1810.00464