Skip to main content

Showing 1–5 of 5 results for author: McGrew, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.07610  [pdf, other

    cs.CR

    Assessing and Exploiting Domain Name Misinformation

    Authors: Blake Anderson, David McGrew

    Abstract: Cloud providers' support for network evasion techniques that misrepresent the server's domain name is more prevalent than previously believed, which has serious implications for security and privacy due to the reliance on domain names in common security architectures. Domain fronting is one such evasive technique used by privacy enhancing technologies and malware to hide the domains they visit, an… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

    Comments: Presented at the 8th International Workshop on Traffic Measurements for Cybersecurity (WTMC 2023)

  2. arXiv:2009.01939  [pdf, other

    cs.CR

    Accurate TLS Fingerprinting using Destination Context and Knowledge Bases

    Authors: Blake Anderson, David McGrew

    Abstract: Network fingerprinting is used to identify applications, provide insight into network traffic, and detect malicious activity. With the broad adoption of TLS, traditional fingerprinting techniques that rely on clear-text data are no longer viable. TLS-specific techniques have been introduced that create a fingerprint string from carefully selected data features in the client_hello to facilitate pro… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

  3. arXiv:1805.11544  [pdf, other

    cs.CR

    Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption

    Authors: Blake Anderson, Andrew Chi, Scott Dunlop, David McGrew

    Abstract: We present new analytic techniques for inferring HTTP semantics from passive observations of HTTPS that can infer the value of important fields including the status-code, Content-Type, and Server, and the presence or absence of several additional HTTP header fields, e.g., Cookie and Referer. Our goals are twofold: to better understand the limitations of the confidentiality of HTTPS, and to explore… ▽ More

    Submitted 29 May, 2018; originally announced May 2018.

  4. arXiv:1706.08003  [pdf, other

    cs.CR

    OS Fingerprinting: New Techniques and a Study of Information Gain and Obfuscation

    Authors: Blake Anderson, David McGrew

    Abstract: Passive operating system fingerprinting reveals valuable information to the defenders of heterogeneous private networks; at the same time, attackers can use fingerprinting to reconnoiter networks, so defenders need obfuscation techniques to foil them. We present an effective approach for passive fingerprinting that uses data features from TLS as well as the TCP/IP and HTTP protocols in a multi-ses… ▽ More

    Submitted 24 June, 2017; originally announced June 2017.

    Comments: 10 pages, 5 figures

  5. arXiv:1607.01639  [pdf, other

    cs.CR

    Deciphering Malware's use of TLS (without Decryption)

    Authors: Blake Anderson, Subharthi Paul, David McGrew

    Abstract: The use of TLS by malware poses new challenges to network threat detection because traditional pattern-matching techniques can no longer be applied to its messages. However, TLS also introduces a complex set of observable data features that allow many inferences to be made about both the client and the server. We show that these features can be used to detect and understand malware communication,… ▽ More

    Submitted 6 July, 2016; originally announced July 2016.

    Comments: 15 pages, 4 figures