Ralph Holz
YOU?
Author Swipe
View article: Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns
Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns Open
Internet-wide scans are an important tool to evaluate the deployment of services. To enable large-scale application layer scans, a fast, stateless port scan (e.g., using ZMap) is often performed ahead of time to collect responsive targets.…
View article: Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach
Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach Open
Businesses increasingly outsource their ICT services to cloud environments, mostly driven by considerations about costs, processes and security. However concerns around cloud exposure against cyber-security attacks are also growing. This b…
View article: On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care?
On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care? Open
Internet eXchange Points (IXPs) provide an infrastructure where content providers and consumers can freely exchange network traffic. The main incentive for connecting to an IXP is to decrease costs and improve the user experience by having…
View article: Post-Compromise Security in Self-Encryption
Post-Compromise Security in Self-Encryption Open
In self-encryption, a device encrypts some piece of information for itself to decrypt in the future. We are interested in security of self-encryption when the state occasionally leaks. Applications that use self-encryption include cloud st…
View article: On the Origin of Scanning
On the Origin of Scanning Open
Fast IPv4 scanning has enabled researchers to answer a wealth of security and networking questions. Yet, despite widespread use, there has been little validation of the methodology's accuracy, including whether a single scan provides suffi…
View article: Update on ACM SIGCOMM CCR reviewing process
Update on ACM SIGCOMM CCR reviewing process Open
This editorial note aims to first inform the SIGCOMM community on the reviewing process in place currently at CCR, and second, share our plans to make CCR a more open and welcoming venue by making changes to the review process, adding more…
View article: An empirical study of availability and reliability properties of the Bitcoin Lightning Network
An empirical study of availability and reliability properties of the Bitcoin Lightning Network Open
The Bitcoin Lightning network is a mechanism to enable fast and inexpensive off-chain Bitcoin transactions using peer-to-peer (P2P) channels between nodes that can also be composed into a routing path. Although the resulting possible chann…
View article: A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web Open
In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code a…
View article: A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web Open
In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code a…
View article: Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis
Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis Open
Objectives To investigate whether and how user data are shared by top rated medicines related mobile applications (apps) and to characterise privacy risks to app users, both clinicians and consumers. Design Traffic, content, and network an…
View article: The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem Open
In this paper, we analyze the evolution of Certificate Transparency (CT) over\ntime and explore the implications of exposing certificate DNS names from the\nperspective of security and privacy. We find that certificates in CT logs have\nse…
View article: Vandal: A Scalable Security Analysis Framework for Smart Contracts
Vandal: A Scalable Security Analysis Framework for Smart Contracts Open
The rise of modern blockchains has facilitated the emergence of smart contracts: autonomous programs that live and run on the blockchain. Smart contracts have seen a rapid climb to prominence, with applications predicted in law, business, …
View article: A First Look at Certification Authority Authorization (CAA)
A First Look at Certification Authority Authorization (CAA) Open
Shaken by severe compromises, the Web’s Public Key Infrastructure has seen the addition of several security mechanisms over recent years. One such mechanism is the Certification Authority Authorization (CAA) DNS record, that gives domain n…
View article: Endpoint-Transparent Multipath Transport with Software-Defined Networks
Endpoint-Transparent Multipath Transport with Software-Defined Networks Open
Multipath forwarding consists of using multiple paths simultaneously to transport data over the network. While most such techniques require endpoint modifications, we investigate how multipath forwarding can be done inside the network, tra…
View article: HEAP: Reliable Assessment of BGP Hijacking Attacks
HEAP: Reliable Assessment of BGP Hijacking Attacks Open
The detection of BGP prefix hijacking attacks has been the focus of research for more than a decade. However, state-of-the-art techniques fall short of detecting more elaborate types of attack. To study such attacks, we devise a novel form…
View article: New kids on the block: an analysis of modern blockchains
New kids on the block: an analysis of modern blockchains Open
Half a decade after Bitcoin became the first widely used cryptocurrency, blockchains are receiving considerable interest from industry and the research community. Modern blockchains feature services such as name registration and smart cont…