Zobrazeno 1 - 10
of 145
pro vyhledávání: '"Vern Paxson"'
Publikováno v:
IEEE Security & Privacy. 16:24-33
Many accounts of censorship begin—and end—with anecdotes or short-term studies from a handful of vantage points. To enable continuous measurement of network-level censorship on an Internet-wide basis, Augur leverages TCP/IP side channels to measu
Autor:
Vern Paxson, William R. Marczak
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 2, Pp 172-185 (2017)
New methods of dissident surveillance employed by repressive nation-states increasingly involve socially engineering targets into unwitting cooperation (e.g., by convincing them to open a malicious attachment or link). While a fair amount is understo
Publikováno v:
ACM SIGCOMM Computer Communication Review. 47:27-35
In this paper we investigate the vulnerability of the Internet Group Management Protocol (IGMP) to be leveraged for denial-of-service (DoS) attacks. IGMP is a connectionless protocol and therefore susceptible to attackers spoofing a third-party victi
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 2, Pp 100-114 (2016)
Websites extensively track users via identifiers that uniquely map to client machines or user accounts. Although such tracking has desirable properties like enabling personalization and website analytics, it also raises serious concerns about online
Autor:
Vern Paxson, Paul Pearce, Phillipa Gill, Sadia Afroz, Michael Carl Tschantz, Rishab Nithyanand, Rachee Singh
Publikováno v:
ANRW
Facing undesired traffic from the Tor anonymity network, online service providers discriminate against Tor users. In this study we characterize the extent of discrimination faced by Tor users and the nature of undesired traffic exiting from the Tor n
Autor:
Shehar Bano, Mobin Javed, Srikanth Sundaresan, Steven J. Murdoch, Philipp M. Richter, Richard Mortier, Vern Paxson, Zakir Durumeric
Internet-wide scanning depends on a notion of liveness: does a target IP address respond to a probe packet? However, the interpretation of such responses, or lack of them, is nuanced and depends on multiple factors, including: how we probed, how diff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d827dcf517c42cb7a0c74c04d0a4c814
https://www.repository.cam.ac.uk/handle/1810/277542
https://www.repository.cam.ac.uk/handle/1810/277542
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2015, Iss 2, Pp 46-64 (2015)
We describe “domain fronting,” a versatile censorship circumvention technique that hides the remote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to
Publikováno v:
ACM SIGCOMM Computer Communication Review. 45:21-31
With the ongoing exhaustion of free address pools at the registries serving the global demand for IPv4 address space, scarcity has become reality. Networks in need of address space can no longer get more address allocations from their respective regi
Publikováno v:
Internet Measurement Conference
The right vantage point is critical to the success of any active measurement. However, most research groups cannot afford to design, deploy, and maintain their own network of measurement endpoints, and thus rely measurement infrastructure shared by o
Publikováno v:
Internet Measurement Conference
Fast IPv4 scanning has enabled researchers to answer a wealth of new security and measurement questions. However, while increased network speeds and computational power have enabled comprehensive scans of the IPv4 address space, a brute-force approac