0

DDoS Detection at the Scale of One Hundred Tbps

Defending against Distributed Denial-of-Service (DDoS) attacks is a critical priority for cloud providers, who must manage ever-growing volumes of both benign and malicious traffic. While state-of-the-art DDoS detection systems leverage programmable …

Secure Vickrey Auctions for Online Advertising

Online advertising is an essential part of the web ecosystem. When a user's browser lands on a webpage, advertisers bid for the ad space on the webpage. An auction algorithm (e.g., Vickrey/second-price auction) is executed to determine the winner and …

Enabling Anonymous Online Streaming Analytics at the Network Edge

In recent years, content hyper-giants have increasingly deployed server infrastructure and services close to end-users within "eyeball" networks. Still, online streaming analytics has largely remained unaffected by this trend. This is despite the …

Collusion Resistant DNS With Private Information Retrieval

There has been a growing interest in Internet user privacy, demonstrated by the popularity of privacy-preserving products such as Telegram and Brave, and the widespread adoption of HTTPS. The Domain Name System (DNS) is a key component of …

PreAcher: Secure and Practical Password Pre-Authentication by Content Delivery Networks

In today's Internet, websites widely rely on password authentication for user logins. However, the intensive computation required for password authentication exposes web servers to Application-layer DoS (ADoS) attacks exploiting the login interfaces. …

Snatch: Online Streaming Analytics at the Network Edge

In recent years, we have witnessed a growing trend of content hyper-giants deploying server infrastructure and services close to end-users, in “eyeball” networks. Still, one of the services that remained largely unaffected by this trend is online …

Decoding the Kodi Ecosystem

Free and open source media centers are experiencing a boom in popularity for the convenience they offer users seeking to remotely consume digital content. Kodi is today’s most popular home media center, with millions of users worldwide. Kodi’s …

FIAT: Frictionless Authentication of IoT Traffic

Home IoT (Internet of Things) deployments are vulnerable to local adversaries, compromising a LAN, and remote adversaries, compromising either the accounts associated with IoT devices or third-party devices like mobile phones used to control the IoT. …

Monetizing Spare Bandwidth: the Case of Distributed VPNs

Residential Internet speeds have been rapidly increasing, reaching averages of ∼100 Mbps in most developed countries. Several studies have shown that users have way more bandwidth than they need, only using about 20-30% on a regular day. Several …

De-Kodi: Understanding the Kodi Ecosystem

Free and open source media centers are currently experiencing a boom in popularity for the convenience and flexibility they offer users seeking to remotely consume digital content. This newfound fame is matched by increasing notoriety — for their …