Skip to main content

Showing 1–7 of 7 results for author: Jonker, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2205.08890  [pdf, other

    cs.CR

    Analysing and strengthening OpenWPM's reliability

    Authors: Benjamin Krumnow, Hugo Jonker, Stefan Karsch

    Abstract: Automated browsers are widely used to study the web at scale. Their premise is that they measure what regular browsers would encounter on the web. In practice, deviations due to detection of automation have been found. To what extent automated browsers can be improved to reduce such deviations has so far not been investigated in detail. In this paper, we investigate this for a specific web automat… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  2. arXiv:2201.08686  [pdf, other

    cs.CR

    Modelling Agent-Skipping Attacks in Message Forwarding Protocols

    Authors: Zach Smith, Hugo Jonker, Sjouke Mauw, Hyunwoo Lee

    Abstract: Message forwarding protocols are protocols in which a chain of agents handles transmission of a message. Each agent forwards the received message to the next agent in the chain. For example, TLS middleboxes act as intermediary agents in TLS, adding functionality such as filtering or compressing data. In such protocols, an attacker may attempt to bypass one or more intermediary agents. Such an agen… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  3. arXiv:2108.10071  [pdf, other

    cs.CR

    Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts

    Authors: Christof Ferreira Torres, Hugo Jonker, Radu State

    Abstract: Fixing bugs is easiest by patching source code. However, source code is not always available: only 0.3% of the ~49M smart contracts that are currently deployed on Ethereum have their source code publicly available. Moreover, since contracts may call functions from other contracts, security flaws in closed-source contracts may affect open-source contracts as well. However, current state-of-the-art… ▽ More

    Submitted 4 July, 2022; v1 submitted 23 August, 2021; originally announced August 2021.

  4. arXiv:2003.05987  [pdf, other

    cs.CR

    ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks

    Authors: Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw

    Abstract: In recent years, smart contracts have suffered major exploits, costing millions of dollars. Unlike traditional programs, smart contracts are deployed on a blockchain. As such, they cannot be modified once deployed. Though various tools have been proposed to detect vulnerable smart contracts, the majority fails to protect vulnerable contracts that have already been deployed on the blockchain. Only… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

  5. arXiv:1912.06176  [pdf, other

    cs.CR cs.NI

    Investigating the effectiveness of web adblockers

    Authors: Clayton Drazner, Nikola Đuza, Hugo Jonker, Dan S. Wallach

    Abstract: We investigate adblocking filters and the extent to which websites and advertisers react when their content is impacted by these filters. We collected data daily from the Alexa Top-5000 web sites for 120 days, and from specific sites that newly appeared in filter lists for 140 days. By evaluating how long a filter rule triggers on a website, we can gauge how long it remains effective. We matched w… ▽ More

    Submitted 12 December, 2019; originally announced December 2019.

  6. arXiv:1808.08403  [pdf, ps, other

    cs.CR

    Formal Analysis of an E-Health Protocol

    Authors: Naipeng Dong, Hugo Jonker, Jun Pang

    Abstract: Given the sensitive nature of health data, security and privacy in e-health systems is of prime importance. It is crucial that an e-health system must ensure that users remain private - even if they are bribed or coerced to reveal themselves, or others: a pharmaceutical company could, for example, bribe a pharmacist to reveal information which breaks a doctor's privacy. In this paper, we first ide… ▽ More

    Submitted 25 August, 2018; originally announced August 2018.

  7. arXiv:1808.00840  [pdf, other

    cs.CR

    Shepherd: Enabling Automatic and Large-Scale Login Security Studies

    Authors: Hugo Jonker, Jelmer Kalkman, Benjamin Krumnow, Marc Sleegers, Alan Verresen

    Abstract: More and more parts of the internet are hidden behind a login field. This poses a barrier to any study predicated on scanning the internet. Moreover, the authentication process itself may be a weak point. To study authentication weaknesses at scale, automated login capabilities are needed. In this work we introduce Shepherd, a scanning framework to automatically log in on websites. The Shepherd fr… ▽ More

    Submitted 2 August, 2018; originally announced August 2018.