GM
G.C. Moreira Moura
20 records found
1
Phishing on the web is a model of social engineering and an attack vector for getting access to sensitive and financial data of individuals and corporations. Phishing has been identified as one of the prime cyber threats in recent years. With the goal to effectively identifying a
...
Time synchronization is of paramount importance on the Internet, with the Network Time Protocol (NTP) serving as the primary synchronization protocol. The NTP Pool, a volunteer-driven initiative launched two decades ago, facilitates connections between clients and NTP servers. Ou
...
Time synchronization is of paramount importance on the Internet, with the Network Time Protocol (NTP) serving as the primary synchronization protocol. The NTP Pool, a volunteer-driven initiative launched two decades ago, facilitates connections between clients and NTP servers. Ou
...
Phishing on the web is a model of social engineering and an attack vector for getting access to sensitive and financial data of individuals and corporations. Phishing has been identified as one of the prime cyber threats in recent years. With the goal to effectively identifying a
...
hishing on the web is a model of social engineering and an attack vector for getting access to sensitive and financial data of individ- uals and corporations. Phishing has been identified as one of the prime cyber threats in recent years. With the goal to effectively identifying
...
hishing on the web is a model of social engineering and an attack vector for getting access to sensitive and financial data of individ- uals and corporations. Phishing has been identified as one of the prime cyber threats in recent years. With the goal to effectively identifying
...
Intercept and Inject
DNS Response Manipulation in the Wild
DNS is a protocol responsible for translating human-readable domain names into IP addresses. Despite being essential for many Internet services to work properly, it is inherently vulnerable to manipulation. In November 2021, users from Mexico received bogus DNS responses when res
...
Time synchronization is crucial on the Internet, and the Network Time Protocol
(NTP) serves as the primary synchronization protocol. The NTP Pool, a
volunteer-driven project introduced 20 years ago, connects clients with NTP servers. Our analysis of Root DNS queries revea ...
(NTP) serves as the primary synchronization protocol. The NTP Pool, a
volunteer-driven project introduced 20 years ago, connects clients with NTP servers. Our analysis of Root DNS queries revea ...
Electronic government (e-gov) enables citizens and residents to digitally interact with their government via the Internet. Underpinning these services is the Internet Domain Name Systems (DNS), which maps e-gov domain names to Internet addresses. Structuring DNS with multiple lev
...
Old but Gold
Prospecting TCP to Engineer and Live Monitor DNS Anycast
DNS latency is a concern for many service operators: CDNs exist to reduce service latency to end-users but must rely on global DNS for reachability and load-balancing. Today, DNS latency is monitored by active probing from distributed platforms like RIPE Atlas, with Verfploeter,
...
LogoMotive
Detecting Logos on Websites to Identify Online Scams - A TLD Case Study
Logos give a website a familiar feel and promote trust. Scammers take advantage of that by using well-known organizations’ logos on malicious websites. Unsuspecting Internet users see these logos and think they are looking at a government website or legitimate webshop, when it is
...
Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of the foundations of their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this problem, we propose the novel notion
...
dnstracker
Measuring Centralization of DNS Infrastructure in the Wild
The Internet Domain Naming System (DNS) is one of the pillars for the Internet and has been the subject of various Distributed Denial-of-Service (DDoS) attacks over the years. As a countermeasure, the DNS infrastructure has been engineered with a series of replication measures, s
...
Counterfighting Counterfeit
Detecting and Taking down Fraudulent Webshops at a ccTLD
Luxury goods such as sneakers and bags are in high demand. Many websites offer them at high discounts, which, in many cases, are simply cheap counterfeit versions of the original product. Online shoppers, however, may be unaware they are buying a counterfeit product and end up be
...
DNS Observatory
The big picture of the DNS
The Domain Name System (DNS) is thought of as having the simple-sounding task of resolving domains into IP addresses. With its stub resolvers, different layers of recursive resolvers, authoritative nameservers, a multitude of query types, and DNSSEC, the DNS ecosystem is actually
...
Cybercrime after the sunrise
A statistical analysis of DNS abuse in new gTLDs
To enhance competition and choice in the domain name system, ICANN introduced the new gTLD program, which added hundreds of new gTLDs (e.g. .nyc, .io) to the root DNS zone. While the program arguably increased the range of domain names available to consumers, it might also have c
...
No domain left behind
Is Let's Encrypt democratizing encryption?
The 2013 National Security Agency revelations of pervasive monitoring have led to an "encryption rush" across the computer and Internet industry. To push back against massive surveillance and protect users' privacy, vendors, hosting and cloud providers have widely deployed encryp
...
This documents presents the final report of a two-year project to evaluate the impact of AbuseHUB, a Dutch clearinghouse for acquiring and processing abuse data on infected machines. The report was commissioned by the Netherlands Ministry of Economic Affairs, a co-funder of the d
...