Zobrazeno 1 - 10
of 795
pro vyhledávání: '"Wählisch A"'
Publikováno v:
Proceedings of ACM Internet Measurement Conference (IMC), 2024
In this paper, we present a detailed performance analysis of QUIC instant ACK, a standard-compliant approach to reduce waiting times during the QUIC connection setup in common CDN deployments. To understand the root causes of the performance properti
Externí odkaz:
http://arxiv.org/abs/2410.20602
Autor:
Hiesgen, Raphael, Nawrocki, Marcin, Barcellos, Marinho, Kopp, Daniel, Hohlfeld, Oliver, Chan, Echo, Dobbins, Roland, Doerr, Christian, Rossow, Christian, Thomas, Daniel R., Jonker, Mattijs, Mok, Ricky, Luo, Xiapu, Kristoff, John, Schmidt, Thomas C., Wählisch, Matthias, claffy, kc
Publikováno v:
Proceedings of ACM Internet Measurement Conference (IMC), 2024
Motivated by the impressive but diffuse scope of DDoS research and reporting, we undertake a multistakeholder (joint industry-academic) analysis to seek convergence across the best available macroscopic views of the relative trends in two dominant cl
Externí odkaz:
http://arxiv.org/abs/2410.11708
Autor:
Tehrani, Pouyan Fotouhi, Hiesgen, Raphael, Lübeck, Teresa, Schmidt, Thomas C., Wählisch, Matthias
Integrity and trust on the web build on X.509 certificates. Misuse or misissuance of these certificates threaten the Web PKI security model, which led to the development of several guarding techniques. In this paper, we study the DNS/DNSSEC records C
Externí odkaz:
http://arxiv.org/abs/2407.02287
Autor:
Ayoub, Ibrahim, Lenders, Martine S., Ampeau, Benoît, Balakrichenan, Sandoche, Khawam, Kinda, Schmidt, Thomas C., Wählisch, Matthias
In this paper, we investigate the domain names of servers on the Internet that are accessed by IoT devices performing machine-to-machine communications. Using machine learning, we classify between them and domain names of servers contacted by other t
Externí odkaz:
http://arxiv.org/abs/2404.15068
Over the last 30 years, the World Wide Web has changed significantly. In this paper, we argue that common practices to prepare web pages for delivery conflict with many efforts to present content with minimal latency, one fundamental goal that pushed
Externí odkaz:
http://arxiv.org/abs/2403.07828
Transport Layer Security (TLS) is the base for many Internet applications and services to achieve end-to-end security. In this paper, we provide guidance on how to measure TLS deployments, including X.509 certificates and Web PKI. We introduce common
Externí odkaz:
http://arxiv.org/abs/2401.18053
Long range wireless transmission techniques such as LoRa are preferential candidates for a substantial class of IoT applications, as they avoid the complexity of multi-hop wireless forwarding. The existing network solutions for LoRa, however, are not
Externí odkaz:
http://arxiv.org/abs/2307.03649
Autor:
Nawrocki, Marcin, Kristoff, John, Hiesgen, Raphael, Kanich, Chris, Schmidt, Thomas C., Wählisch, Matthias
Publikováno v:
Proceedings of the IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023
In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and data analysis including cautious threshold inference. We survey common amplifica
Externí odkaz:
http://arxiv.org/abs/2302.04614
Autor:
Lanzieri, Leandro, Martino, Gianluca, Fey, Goerschwin, Schlarb, Holger, Schmidt, Thomas C., Wählisch, Matthias
Embedded digital devices are progressively deployed in dependable or safety-critical systems. These devices undergo significant hardware ageing, particularly in harsh environments. This increases their likelihood of failure. It is crucial to understa
Externí odkaz:
http://arxiv.org/abs/2301.06804
Security is essential for the Internet of Things (IoT). Cryptographic operations for authentication and encryption commonly rely on random input of high entropy and secure, tamper-resistant identities, which are difficult to obtain on constrained emb
Externí odkaz:
http://arxiv.org/abs/2301.07048