Skip to main content

Showing 1–7 of 7 results for author: Borgolte, K

Searching in archive cs. Search in all archives.
.
  1. Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols

    Authors: Carlotta Tagliaro, Martina Komsic, Andrea Continella, Kevin Borgolte, Martina Lindorfer

    Abstract: Internet-of-Things (IoT) devices, ranging from smart home assistants to health devices, are pervasive: Forecasts estimate their number to reach 29 billion by 2030. Understanding the security of their machine-to-machine communication is crucial. Prior work focused on identifying devices' vulnerabilities or proposed protocol-specific solutions. Instead, we investigate the security of backends speaki… ▽ More

    Submitted 1 October, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: Appeared at the 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024)

  2. arXiv:2103.13287  [pdf, other

    cs.CY cs.CR cs.HC

    Human Factors in Security Research: Lessons Learned from 2008-2018

    Authors: Mannat Kaur, Michel van Eeten, Marijn Janssen, Kevin Borgolte, Tobias Fiebig

    Abstract: Instead of only considering technology, computer security research now strives to also take into account the human factor by studying regular users and, to a lesser extent, experts like operators and developers of systems. We focus our analysis on the research on the crucial population of experts, whose human errors can impact many systems at once, and compare it to research on regular users. To u… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

  3. Can Encrypted DNS Be Fast?

    Authors: Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster

    Abstract: In this paper, we study the performance of encrypted DNS protocols and conventional DNS from thousands of home networks in the United States, over one month in 2020. We perform these measurements from the homes of 2,693 participating panelists in the Federal Communications Commission's (FCC) Measuring Broadband America program. We found that clients do not have to trade DNS performance for privacy… ▽ More

    Submitted 27 July, 2021; v1 submitted 14 July, 2020; originally announced July 2020.

    Comments: Presented at the Passive and Active Measurement Conference 2021. The final authenticated publication is available online at https://doi.org/10.1007/978-3-030-72582-2_26

  4. arXiv:2006.13086  [pdf, other

    cs.NI cs.CR

    Classifying Network Vendors at Internet Scale

    Authors: Jordan Holland, Ross Teixeira, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, Jonathan Mayer

    Abstract: In this paper, we develop a method to create a large, labeled dataset of visible network device vendors across the Internet by mapping network-visible IP addresses to device vendors. We use Internet-wide scanning, banner grabs of network-visible devices across the IPv4 address space, and clustering techniques to assign labels to more than 160,000 devices. We subsequently probe these devices and us… ▽ More

    Submitted 24 June, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: 11 Pages, 2 figures, 7 tables

  5. arXiv:2003.07684  [pdf, other

    cs.CY

    Identifying Disinformation Websites Using Infrastructure Features

    Authors: Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan Mayer

    Abstract: Platforms have struggled to keep pace with the spread of disinformation. Current responses like user reports, manual analysis, and third-party fact checking are slow and difficult to scale, and as a result, disinformation can spread unchecked for some time after being created. Automation is essential for enabling platforms to respond rapidly to disinformation. In this work, we explore a new direct… ▽ More

    Submitted 28 September, 2020; v1 submitted 28 February, 2020; originally announced March 2020.

  6. Encryption without Centralization: Distributing DNS Queries Across Recursive Resolvers

    Authors: Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster

    Abstract: Emerging protocols such as DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) improve the privacy of DNS queries and responses. While this trend towards encryption is positive, deployment of these protocols has in some cases resulted in further centralization of the DNS, which introduces new challenges. In particular, centralization has consequences for performance, privacy, and availability; a potential… ▽ More

    Submitted 21 September, 2021; v1 submitted 20 February, 2020; originally announced February 2020.

    Comments: Presented at the ACM/IRTF Applied Networking Research Workshop 2021 (ANRW '21)

  7. Comparing the Effects of DNS, DoT, and DoH on Web Performance

    Authors: Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster

    Abstract: Nearly every service on the Internet relies on the Domain Name System (DNS), which translates a human-readable name to an IP address before two endpoints can communicate. Today, DNS traffic is unencrypted, leaving users vulnerable to eavesdropping and tampering. Past work has demonstrated that DNS queries can reveal a user's browsing history and even what smart devices they are using at home. In r… ▽ More

    Submitted 23 February, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: The Web Conference 2020 (WWW '20)