Quirin Scheitle
YOU?
Author Swipe
View article: A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web Open
In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code a…
View article: A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web Open
In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code a…
View article: The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem Open
In this paper, we analyze the evolution of Certificate Transparency (CT) over\ntime and explore the implications of exposing certificate DNS names from the\nperspective of security and privacy. We find that certificates in CT logs have\nse…
View article: Clusters in the Expanse
Clusters in the Expanse Open
Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In recent years, several studies have proposed the use of target…
View article: A Long Way to the Top
A Long Way to the Top Open
A broad range of research areas including Internet measurement, privacy, and\nnetwork security rely on lists of target domains to be analysed; researchers\nmake use of target lists for reasons of necessity or efficiency. The popular\nAlexa…
View article: Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists
Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists Open
Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In recent years, several studies have proposed the use of target…
View article: A First Look at Certification Authority Authorization (CAA)
A First Look at Certification Authority Authorization (CAA) Open
Shaken by severe compromises, the Web’s Public Key Infrastructure has seen the addition of several security mechanisms over recent years. One such mechanism is the Certification Authority Authorization (CAA) DNS record, that gives domain n…
View article: Structure and Stability of Internet Top Lists
Structure and Stability of Internet Top Lists Open
Active Internet measurement studies rely on a list of targets to be scanned. While probing the entire IPv4 address space is feasible for scans of limited complexity, more complex scans do not scale to measuring the full Internet. Thus, a s…
View article: The Amplification Threat Posed by Publicly Reachable BACnet Devices
The Amplification Threat Posed by Publicly Reachable BACnet Devices Open
In a connected world Internet security is becoming increasingly important. Attacks, which are frequently executed by botnets, can impact people in their everyday life. A ubiquitous kind of attack is the amplification attack, a special type…
View article: HLOC: Hints-based geolocation leveraging multiple measurement frameworks
HLOC: Hints-based geolocation leveraging multiple measurement frameworks Open
Geographically locating an IP address is of interest for many purposes. There are two major ways to obtain the location of an IP address: querying commercial databases or conducting latency measurements. For structural Internet nodes, such…
View article: Large-Scale Classification of IPv6-IPv4 Siblings with Variable Clock Skew
Large-Scale Classification of IPv6-IPv4 Siblings with Variable Clock Skew Open
Linking the growing IPv6 deployment to existing IPv4 addresses is an interesting field of research, be it for network forensics, structural analysis, or reconnaissance. In this work, we focus on classifying pairs of server IPv6 and IPv4 ad…
View article: The Amplification Threat Posed by PubliclyReachable BACnet Devices
The Amplification Threat Posed by PubliclyReachable BACnet Devices Open
In a connected world Internet security is becoming increasingly important.Attacks, which are frequently executed by botnets, can impact people in their everyday life.A ubiquitous kind of attack is the amplification attack, a special type o…
View article: Large-Scale Classification of IPv6-IPv4 Siblings with Variable Clock\n Skew
Large-Scale Classification of IPv6-IPv4 Siblings with Variable Clock\n Skew Open
Linking the growing IPv6 deployment to existing IPv4 addresses is an\ninteresting field of research, be it for network forensics, structural\nanalysis, or reconnaissance. In this work, we focus on classifying pairs of\nserver IPv6 and IPv4…
View article: Scanning the IPv6 Internet: Towards a Comprehensive Hitlist
Scanning the IPv6 Internet: Towards a Comprehensive Hitlist Open
Active network measurements constitute an impor- tant part in gaining a better understanding of the Internet. Although IPv4-wide scans are now easily possible, random active probing is infeasible in the IPv6 Internet. Therefore, we propose…
View article: Carrier-Grade Anomaly Detection Using Time-to-Live Header Information
Carrier-Grade Anomaly Detection Using Time-to-Live Header Information Open
Time-to-Live data in the IP header offers two interesting characteristics: First, different IP stacks pick different start TTL values. Second, each traversed router should decrement the TTL value. The combination of both offers host and ro…