Skip to main content

Showing 1–17 of 17 results for author: van Oorschot, P C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.00968  [pdf, ps, other

    cs.CR

    ss2DNS: A Secure DNS Scheme in Stage 2

    Authors: Ali Sadeghi Jahromi, AbdelRahman Abdou, Paul C. van Oorschot

    Abstract: The absence of security and privacy measures between DNS recursive resolvers and authoritative nameservers has been exploited by both on-path and off-path attackers. Although numerous security proposals have been introduced in practice and in the literature, they often face deployability barriers and/or lack a compelling set of security and privacy properties, resulting in limited adoption. We int… ▽ More

    Submitted 25 June, 2025; v1 submitted 1 August, 2024; originally announced August 2024.

    Comments: 15 pages, 7 figures

  2. arXiv:2308.13074  [pdf, other

    cs.HC

    Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions

    Authors: Srivathsan G. Morkonda, Sonia Chiasson, Paul C. van Oorschot

    Abstract: Web users are increasingly presented with multiple login options, including password-based login and common web single sign-on (SSO) login options such as "Login with Google" and "Login with Facebook". There has been little focus in previous studies on how users choose from a list of login options and how to better inform users about privacy issues in web SSO systems. In this paper, we conducted a… ▽ More

    Submitted 28 December, 2023; v1 submitted 24 August, 2023; originally announced August 2023.

  3. arXiv:2209.04502  [pdf, other

    cs.CR

    A Close Look at a Systematic Method for Analyzing Sets of Security Advice

    Authors: David Barrera, Christopher Bellman, Paul C. van Oorschot

    Abstract: We carry out a detailed analysis of the security advice coding method (SAcoding) of Barrera et al. (2021), which is designed to analyze security advice in the sense of measuring actionability and categorizing advice items as practices, policies, principles, or outcomes. The main part of our analysis explores the extent to which a second coder's assignment of codes to advice items agrees with that… ▽ More

    Submitted 13 June, 2023; v1 submitted 9 September, 2022; originally announced September 2022.

  4. arXiv:2209.04490  [pdf, other

    cs.CR

    "Sign in with ... Privacy'': Timely Disclosure of Privacy Differences among Web SSO Login Options

    Authors: Srivathsan G. Morkonda, Sonia Chiasson, Paul C. van Oorschot

    Abstract: The number of login options on web sites has increased since the introduction of web single sign-on (SSO) protocols. Web SSO services allow users to grant web sites or relying parties (RPs) access to their personal profile information from identity provider (IdP) accounts. Many RP sites fail to provide sufficient privacy-related information to allow users to make informed login decisions. Moreover… ▽ More

    Submitted 19 December, 2024; v1 submitted 9 September, 2022; originally announced September 2022.

  5. arXiv:2209.01285  [pdf, other

    cs.CR

    Security Best Practices: A Critical Analysis Using IoT as a Case Study

    Authors: David Barrera, Christopher Bellman, Paul C. van Oorschot

    Abstract: Academic research has highlighted the failure of many Internet of Things (IoT) product manufacturers to follow accepted practices, while IoT security best practices have recently attracted considerable attention worldwide from industry and governments. Given current examples of security advice, confusion is evident from guidelines that conflate desired outcomes with security practices to achieve t… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

  6. arXiv:2206.09237  [pdf, other

    cs.CR

    Systematic Analysis and Comparison of Security Advice as Datasets

    Authors: Christopher Bellman, Paul C. van Oorschot

    Abstract: A long list of documents have been offered as security advice, codes of practice, and security guidelines for building and using security products, including Internet of Things (IoT) devices. To date, little or no systematic analysis has been carried out on the advice datasets themselves. Towards addressing this, with IoT as a case study, we begin with an informal analysis of two documents offerin… ▽ More

    Submitted 14 November, 2022; v1 submitted 18 June, 2022; originally announced June 2022.

  7. arXiv:2103.02579  [pdf, other

    cs.CR

    Exploring Privacy Implications in OAuth Deployments

    Authors: Srivathsan G. Morkonda, Paul C. van Oorschot, Sonia Chiasson

    Abstract: Single sign-on authentication systems such as OAuth 2.0 are widely used in web services. They allow users to use accounts registered with major identity providers such as Google and Facebook to login on multiple services (relying parties). These services can both identify users and access a subset of the user's data stored with the provider. We empirically investigate the end-user privacy implicat… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  8. A survey and analysis of TLS interception mechanisms and motivations

    Authors: Xavier de Carné de Carnavalet, Paul C. van Oorschot

    Abstract: TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees that improve end-user security and privacy. While TLS helps defend against pervasive surveillance of intercepted unencrypted traffic, it also hinders several common beneficial operations typically performed by middleboxes on the network traffic. Consequently, various methods have been proposed that "bypass"… ▽ More

    Submitted 27 December, 2022; v1 submitted 30 October, 2020; originally announced October 2020.

    Comments: This paper will appear in ACM Computing Surveys

  9. arXiv:2004.12179  [pdf, other

    cs.CR

    Best Practices for IoT Security: What Does That Even Mean?

    Authors: Christopher Bellman, Paul C. van Oorschot

    Abstract: Best practices for Internet of Things (IoT) security have recently attracted considerable attention worldwide from industry and governments, while academic research has highlighted the failure of many IoT product manufacturers to follow accepted practices. We explore not the failure to follow best practices, but rather a surprising lack of understanding, and void in the literature, on what (generi… ▽ More

    Submitted 25 April, 2020; originally announced April 2020.

  10. arXiv:1906.11288  [pdf, other

    cs.CR

    Secure Client and Server Geolocation Over the Internet

    Authors: AbdelRahman Abdou, Paul C. van Oorschot

    Abstract: In this article, we provide a summary of recent efforts towards achieving Internet geolocation securely, \ie without allowing the entity being geolocated to cheat about its own geographic location. Cheating motivations arise from many factors, including impersonation (in the case locations are used to reinforce authentication), and gaining location-dependent benefits. In particular, we provide a t… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

  11. arXiv:1808.03071  [pdf, other

    cs.CR

    Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management

    Authors: Markus Miettinen, Paul C. van Oorschot, Ahmad-Reza Sadeghi

    Abstract: The emerging Internet of Things (IoT) drastically increases the number of connected devices in homes, workplaces and smart city infrastructures. This drives a need for means to not only ensure confidentiality of device-related communications, but for device configuration and management---ensuring that only legitimate devices are granted privileges to a local domain, that only authorized agents hav… ▽ More

    Submitted 9 August, 2018; originally announced August 2018.

  12. arXiv:1805.00094  [pdf, other

    cs.CR

    Comparative Analysis and Framework Evaluating Web Single Sign-On Systems

    Authors: Furkan Alaca, Paul C. van Oorschot

    Abstract: We perform a comprehensive analysis and comparison of 14 web single sign-on (SSO) systems proposed and/or deployed over the last decade, including federated identity and credential/password management schemes. We identify common design properties and use them to develop a taxonomy for SSO schemes, highlighting the associated trade-offs in benefits (positive attributes) offered. We develop a framew… ▽ More

    Submitted 9 August, 2020; v1 submitted 30 April, 2018; originally announced May 2018.

  13. arXiv:1804.07706  [pdf, other

    cs.CR

    SoK: Securing Email -- A Stakeholder-Based Analysis (Extended Version)

    Authors: Jeremy Clark, P. C. van Oorschot, Scott Ruoti, Kent Seamons, Daniel Zappala

    Abstract: While email is the most ubiquitous and interoperable form of online communication today, it was not conceived with strong security guarantees, and the ensuing security enhancements are, by contrast, lacking in both ubiquity and interoperability. This situation motivates our research. We begin by identifying a variety of stakeholders who have an interest in the current email system and in efforts t… ▽ More

    Submitted 22 October, 2021; v1 submitted 20 April, 2018; originally announced April 2018.

    Comments: Extended version of paper published at Financial Cryptography 2021. Under submission at CSUR

  14. arXiv:1708.01706  [pdf, other

    cs.CR

    Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes

    Authors: Furkan Alaca, AbdelRahman Abdou, Paul C. van Oorschot

    Abstract: Many password alternatives for web authentication proposed over the years, despite having different designs and objectives, all predominantly rely on the knowledge of some secret. This motivates us, herein, to provide the first detailed exploration of the integration of a fundamentally different element of defense into the design of web authentication schemes: a mimicry-resistance dimension. We an… ▽ More

    Submitted 30 March, 2019; v1 submitted 4 August, 2017; originally announced August 2017.

  15. arXiv:1703.06992  [pdf, other

    cs.NI cs.CR

    A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks

    Authors: AbdelRahman Abdou, Paul C. van Oorschot, Tao Wan

    Abstract: Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural difference implies a different design for control functions necessary for essential network properties, e.g., loop prevention and link redundancy. We explore how such differences redefine the security weaknesses in the SDN con… ▽ More

    Submitted 6 December, 2017; v1 submitted 20 March, 2017; originally announced March 2017.

  16. arXiv:1608.03939  [pdf, other

    cs.CR cs.NI

    Server Location Verification and Server Location Pinning: Augmenting TLS Authentication

    Authors: AbdelRahman Abdou, P. C. van Oorschot

    Abstract: We introduce the first known mechanism providing realtime server location verification. Its uses include enhancing server authentication (e.g., augmenting TLS) by enabling browsers to automatically interpret server location information. We describe the design of this new measurement-based technique, Server Location Verification (SLV), and evaluate it using PlanetLab. We explain how SLV is compatib… ▽ More

    Submitted 16 August, 2016; v1 submitted 13 August, 2016; originally announced August 2016.

    Comments: 14 pages, 4 figures

  17. arXiv:1310.1540  [pdf, other

    cs.CR cs.HC

    Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability

    Authors: Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-Bang Chen

    Abstract: Existing captcha solutions on the Internet are a major source of user frustration. Game captchas are an interesting and, to date, little-studied approach claiming to make captcha solving a fun activity for the users. One broad form of such captchas -- called Dynamic Cognitive Game (DCG) captchas -- challenge the user to perform a game-like cognitive task interacting with a series of dynamic images… ▽ More

    Submitted 6 October, 2013; originally announced October 2013.

    Comments: 16 pages, 10 figures