Filters








370 Hits in 3.8 sec

VPNs AND ENCRYPTION AS BOUNDARY OBJECTS OF THE INTERNET: (MIS)TRUST IN THE TRANSLATION(S)

Luke Heemsbergen, Adam Molnar
2019 Selected Papers of Internet Research, SPIR  
We add to the literature in three ways: empirically unpacking VPNs and e2e encryption as boundary objects that tack back and forth between the technical and abstract, which is novel for the literature;  ...  an exegesis of boundary objects 'on' the internet to consider conceptualizing objects 'of' the internet, which opens a fruitful reconfiguration for internet research; and shedding light on the ways that  ...  Our contribution adds to the literature in three ways, the first is empirical, unpacking VPNs and e2e encryption as boundary objects, which is novel for the literature.  ... 
doi:10.5210/spir.v2019i0.10982 fatcat:uxuborq6wbeatkgoktsb4ruulq

VPNs as boundary objects of the internet: (mis)trust in the translation(s)

Luke Heemsbergen, Adam Molnar
2020 Internet Policy Review  
of market ecosystems for VPN content tack back to the technical through metaphors that reconfigure meaning: do VPN markets offer security and safety, or spying and vulnerability, a commercial data opportunity  ...  , or an ability to circumnavigate commercial or government censorship?  ... 
doi:10.14763/2020.4.1513 fatcat:cqq2c5vh6jhidim453fqyj5y2e

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment

Ali Sajjad, Andrea Zisman, Muttukrishnan Rajarajan, Srijith K. Nair, Theo Dimitrakos
2012 2012 18th IEEE International Conference on Networks (ICON)  
We present the implementation details of our solution as well as experimental results carried out on two commercial clouds.  ...  Nevertheless, a single cloud does not have limitless resources to offer to its users, hence the notion of an Inter-Cloud enviroment where a cloud can use the infrastructure resources of other clouds.  ...  in both academic and commercial domain.  ... 
doi:10.1109/icon.2012.6506596 dblp:conf/icon/SajjadZRND12 fatcat:yu7aur623jac7j3iqbxdtziq7q

Analysis of Topology Poisoning Attacks in Software-Defined Networking [chapter]

Thanh Bui, Markku Antikainen, Tuomas Aura
2019 Lecture Notes in Computer Science  
Background This section gives an overview of commercial VPNs and related work.  ...  Related work This section summarizes the related literature about XSS attacks and security analysis of add-on ecosystems outside the domain of web applications. XSS vulnerabilities.  ... 
doi:10.1007/978-3-030-35055-0_6 fatcat:jtlyewkwcbefxewkdlzxecyaym

FORENSIC AND BEHAVIOR ANALYSIS OF FREE ANDROID VPNS

Tashi Wangchuk, Digvijaysingh Rathod
2021 Journal of Applied Engineering, Technology and Management  
So, the forensic and behavior analysis of selected free android VPNs was carried out to study the usability of free android-based VPNs in terms of providing security and privacy; specifically, the presence  ...  Given the availability of a huge number of Free VPNs in the Google Play store, it was found important that the users must be aware of the inherent risks put by the use of these Free VPNs.  ...  The researchers, Khan and his group in 2018 [6] have cited in their study on Empirical Analysis of the Commercial VPN Ecosystem that some of the countries allow only the government-approved VPN providers  ... 
doi:10.54417/jaetm.v1i1.27 fatcat:bb7w4s5xrbhhlmqouokmj5wxgu

Social Impact Startups, Business Model innovation and Female Management: Lessons for the Next Normal in Mexico using fsQCA

Juan Mejía-Trejo
2022 Nova Scientia  
The main research purpose is the identification of the Key Success Factors (KSF) for Social Impact Startups (SST) and how they face an emergency context (like COVID-19 pandemic) under female management  ...  Value Proposition (VPN).  ...  , KPI, BPL or no matter the level of presence of VPN including the configuration of solution 2 with the high-level presence of EPR or medium values of KPI or VPN or no matter the level presence of MKK  ... 
doi:10.21640/ns.v14i28.2953 fatcat:jzqfnapn3bfnzlno2nrmdhpx6u

A Low-Overhead Secure Communication Framework for an Inter-cloud Environment [chapter]

Ali Sajjad, Muttukrishnan Rajarajan, Theo Dimitrakos
2015 Lecture Notes in Computer Science  
We present the implementation details of our solution as well as experimental results detailing the overheads of our solution carried out on two commercial clouds.  ...  Nevertheless, a single cloud provider may not have limitless resources to offer to its users, hence the notion of an Inter-Cloud environment where a cloud can use the infrastructure resources of other  ...  of a cloud ecosystem over multiple cloud platforms.  ... 
doi:10.1007/978-3-319-19848-4_8 fatcat:agposkc3b5hqxfjpdv4arifud4

ProxyTorrent: Untangling the Free HTTP(S) Proxy Ecosystem [article]

Diego Perino, Matteo Varvello, Claudio Soriente
2017 arXiv   pre-print
Through the analysis of more than 2 Terabytes of proxied traffic, we show that web browsing is the primary user activity.  ...  Our analysis shows that less than 2% of the proxies announced on the web indeed proxy traffic on behalf of users; further, only half of these proxies have decent performance and can be used reliably.  ...  Perta et al., [14] study privacy leaks in commercial VPN systems. Despite a VPN tunnel, they discover the following traffic leakages. First, IPv6 traffic is usually not tunneled.  ... 
arXiv:1612.06126v3 fatcat:i3l5fwygy5a27lldwcxueym3qa

ProxyTorrent

Diego Perino, Matteo Varvello, Claudio Soriente
2018 Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18  
Through the analysis of more than 2 Terabytes of proxied traffic, we show that web browsing is the primary user activity.  ...  Our analysis shows that less than 2% of the proxies announced on the web indeed proxy traffic on behalf of users; further, only half of these proxies have decent performance and can be used reliably.  ...  Perta et al., [14] study privacy leaks in commercial VPN systems. Despite a VPN tunnel, they discover the following traffic leakages. First, IPv6 traffic is usually not tunneled.  ... 
doi:10.1145/3178876.3186086 dblp:conf/www/PerinoVS18 fatcat:wz55okucejd2niamscf3mlfugm

A scalable and dynamic application-level secure communication framework for inter-cloud services

Ali Sajjad, Muttukrishnan Rajarajan, Andrea Zisman, Theo Dimitrakos
2015 Future generations computer systems  
We present the implementation details of our solution as well as experimental results carried out on two commercial clouds.  ...  Nevertheless, a single cloud does not have limitless resources to offer to its users, hence the notion of an Inter-Cloud environment where a cloud can use the infrastructure resources of other clouds.  ...  of a cloud ecosystem over multiple cloud platforms.  ... 
doi:10.1016/j.future.2015.01.018 fatcat:fhvvi63rdnd4zo7ydoqkurluuu

Opportunities And Challenges Of Ad-Based Measurements From The Edge Of The Network

Patricia Callejo, Conor Kelton, Narseo Vallina-Rodriguez, Ruben Cuevas, Oliver Gasser, Christian Kreibich, Florian Wohlfart, Angel Cuevas
2017 Zenodo  
For many years, the research community, practitioners, and regulators have used myriad methods and tools to understand the complex structure and behavior of ISPs from the edge of the network.  ...  In this paper we present AdTag, a network measurement para- digm that leverages the opportunistic nature of online targeted advertising to measure the Internet from the edge of the network.  ...  This work is partially supported by the European Union through the H2020 TYPES (653449) and ReCRED (653417) projects, the Spanish Ministry of Economy and Competitiveness through the DRONEXT project (TEC  ... 
doi:10.5281/zenodo.1321239 fatcat:33ic4cakyrb3vd6odtl47phy3q

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks [article]

Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang
2019 arXiv   pre-print
In this work, we propose a traffic analysis framework based on sequence-learning techniques like LSTM and leveraged the temporal relations between packets for the attack of device identification.  ...  The IoT (Internet of Things) technology has been widely adopted in recent years and has profoundly changed the people's daily lives.  ...  To identify the VPN packets and label those with their corresponding devices, we develop a mapping technique based on three observations obtained through our empirical analysis: (1) The size of a packet  ... 
arXiv:1909.00104v1 fatcat:c6i7uqlfnnfupcr4kapr2ess2u

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic [article]

Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster
2017 arXiv   pre-print
In this paper, we demonstrate that an ISP or other network observer can infer privacy sensitive in-home activities by analyzing Internet traffic from smart homes containing commercially-available IoT devices  ...  even when the devices use encryption.  ...  The only other requirement of the VPN is that it sit outside of the last-mile observer's view; for an adversary like an ISP, this requires that the VPN have a different service provider than the smart  ... 
arXiv:1708.05044v1 fatcat:d7x4izf5w5eo5aa3hym27qfcau

Blockchains in mobility and logistics

Kinnunen Tuomo, Finlow-Bates Keir, Kostiainen Juho, Nykänen Lasse, Rouhiainen Kimmo, Leviäkangas Pekka
2018 Zenodo  
Thirdly, we present a conducted PESTEL analysis to understand the utility and societal impact of blockchains as well as to provide an overall view on this issue for aiding governance.  ...  The current state of blockchain applications for transport is mostly at a proof-of-concept level, with specific cases recently moving towards commercial implementations.  ...  Acknowledgements This paper is based on the SELLO project funded by the Ministry of Transport and Communications, Finland.  ... 
doi:10.5281/zenodo.1491622 fatcat:ewxjakj3zvbkffhccowzv732qm

Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem [article]

Narseo Vallina-Rodriguez, Srikanth Sundaresan, Abbas Razaghpanah, Rishab Nithyanand, Mark Allman, Christian Kreibich, Phillipa Gill
2016 arXiv   pre-print
Using data from users of our ICSI Haystack app we gain a rich view of the mobile ecosystem: we identify and characterize domains associated with mobile advertising and user tracking, thereby taking an  ...  Third-party services form an integral part of the mobile ecosystem: they allow app developers to add features such as performance analytics and social network integration, and to monetize their apps by  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding bodies.  ... 
arXiv:1609.07190v2 fatcat:zvyndbusijfz7f3bqql2olzczu
« Previous Showing results 1 — 15 out of 370 results