Proceedings of the Internet Measurement Conference 2019
DOI: 10.1145/3355369.3355571
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Security Practices and How They Impact Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Neither the ISP nor the IXP ow data contain any payload data, thus no user information. We distinguish user IPs from server IPs and anonymize by hashing all user IPs, following the method described in [5]. e address space of the ISP residential users is known.…”
Section: Isp (Isp-vpmentioning
confidence: 99%
See 1 more Smart Citation
“…Neither the ISP nor the IXP ow data contain any payload data, thus no user information. We distinguish user IPs from server IPs and anonymize by hashing all user IPs, following the method described in [5]. e address space of the ISP residential users is known.…”
Section: Isp (Isp-vpmentioning
confidence: 99%
“…Existing solutions focus on instrumenting testbeds or home environments to collect and analyze full packet captures [3][4][5], local search for IoT anomalies [6,7], active measurements [8,9], or data from antivirus companies running scan campaigns from users homes [7]. In isolation, these data sources do not provide enough insights for preventing network-wide a acks from IoT devices [10].…”
Section: Introductionmentioning
confidence: 99%
“…Tracking the currentness of end-user software hence requires passive measurements using a vantage point that can illuminate version adoption at scale. Second, even if access to such a vantage point is possible, determining useful information, such as the current version of a particular application, is a complex task [11]. While HTTP(S)-based communication has long emerged as the preferred way for applications to communicate, there is no standardized or universally adopted method that applications use to convey their current version to the server they communicate with.…”
Section: Introductionmentioning
confidence: 99%
“…These have ranged from general characteristics of User-Agent strings [23], to studying User-Agent uniqueness [14], it's implications in device proling [40,47], and abuse of UAs [49]. Similar to our approach, information extracted from User-Agent headers has been used to track software adoption [11,21]. Our work greatly expands on the scope and scale of these related works, providing a signicantly longer measurement period, covering orders of magnitude more clients and applications.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation