Philipp Winter
YOU?
Author Swipe
View article: Purpose Mode: Reducing Distraction Through Toggling Attention Capture Damaging Patterns on Social Media Websites
Purpose Mode: Reducing Distraction Through Toggling Attention Capture Damaging Patterns on Social Media Websites Open
Social media websites thrive on user engagement by employing Attention Capture Damaging Patterns (ACDPs), e.g., infinite scroll, that prey on cognitive vulnerabilities to distract users. Prior work has taxonomized these ACDPs, but we have …
View article: Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers?
Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers? Open
The question at which layer network functionality is presented or abstracted remains a research challenge. Traditionally, network functionality was either placed into the core network, middleboxes, or into the operating system -- but recen…
View article: Nitriding: A tool kit for building scalable, networked, secure enclaves
Nitriding: A tool kit for building scalable, networked, secure enclaves Open
Enclave deployments often fail to simultaneously be secure (e.g., resistant to side channel attacks), powerful (i.e., as fast as an off-the-shelf server), and flexible (i.e., unconstrained by development hurdles). In this paper, we present…
View article: The Impact of User Location on Cookie Notices (Inside and Outside of the\n European Union)
The Impact of User Location on Cookie Notices (Inside and Outside of the\n European Union) Open
The web is global, but privacy laws differ by country. Which set of privacy\nrules do websites follow? We empirically study this question by detecting and\nanalyzing cookie notices in an automated way. We crawl 1,500 European,\nAmerican, a…
View article: The Impact of User Location on Cookie Notices (Inside and Outside of the European Union)
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union) Open
The web is global, but privacy laws differ by country. Which set of privacy rules do websites follow? We empirically study this question by detecting and analyzing cookie notices in an automated way. We crawl 1,500 European, American, and …
View article: What's in Your Wallet? Privacy and Security Issues in Web 3.0.
What's in Your Wallet? Privacy and Security Issues in Web 3.0. Open
Much of the recent excitement around decentralized finance (DeFi) comes from hopes that DeFi can be a secure, private, less centralized alternative to traditional finance systems but the accuracy of these hopes has to date been understudie…
View article: Security, Privacy, and Decentralization in Web3
Security, Privacy, and Decentralization in Web3 Open
Much of the recent excitement around decentralized finance (DeFi) comes from hopes that DeFi can be a secure, private, less centralized alternative to traditional finance systems. However, people moving to DeFi sites in hopes of improving …
View article: Chocolatine: Outage Detection for Internet Background Radiation
Chocolatine: Outage Detection for Internet Background Radiation Open
The Internet is a complex ecosystem composed of thousands of Autonomous Systems (ASs) operated by independent organizations; each AS having a very limited view outside its own network. These complexities and limitations impede network oper…
View article: How Do Tor Users Interact With Onion Services?
How Do Tor Users Interact With Onion Services? Open
Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names t…
View article: TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems Open
Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, crimina…
View article: Anomalous keys in Tor relays
Anomalous keys in Tor relays Open
In its more than ten years of existence, the Tor network has seen hundreds of thousands of relays come and go. Each relay maintains several RSA keys, amounting to millions of keys, all archived by The Tor Project. In this paper, we analyze…
View article: The Effect of DNS on Tor's Anonymity
The Effect of DNS on Tor's Anonymity Open
Previous attacks that link the sender and receiver of traffic in the Tor network ("correlation attacks") have generally relied on analyzing traffic from TCP connections. The TCP connections of a typical client application, however, are oft…
View article: Identifying and characterizing Sybils in the Tor network
Identifying and characterizing Sybils in the Tor network Open
Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools and methods to expose Sybil attacks. In this work, we develop…
View article: Identifying and Characterizing Sybils in the Tor Network
Identifying and Characterizing Sybils in the Tor Network Open
Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools and methods to expose Sybil attacks. In this work, we develop…
View article: Analyzing the Great Firewall of China Over Space and Time
Analyzing the Great Firewall of China Over Space and Time Open
A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements many different types of censorship and content filtering to control China’s Internet traffic. Past work has shown that the firewall occasionally…