Matches in SemOpenAlex for { <https://semopenalex.org/work/W4237385602> ?p ?o ?g. }
Showing items 1 to 55 of
55
with 100 items per page.
- W4237385602 abstract "Resources on the Internet are not guaranteed to be available or maintained in perpetuity. Rather, resources may start to be neglected, and eventually be abandoned, by their previous owners. This can affect other Internet services that rely on these resources. When web developers place a link to an external site, for example, they typically do not expect ownership and nature of that site to change. However, around 1.7% of all registered .com domains are deleted every month, and many of them are re-registered by a new owner. Similarly, many websites include JavaScript libraries that are not maintained any more, or they fail to update included libraries when vulnerabilities in these libraries are patched. Abandoned or neglected resources can result in violation of security assumptions, and enable attacks with severe consequences. Therefore, it is critical to quantify how often these scenarios occur in order to understand the extent of the threat. Furthermore, visibility into the underlying reasons can help devise more effective and efficient countermeasures. This thesis proposes novel measurement techniques tailored to two application areas in order to quantify the prevalence and security implications of abandoned or neglected Internet resources. First, we show that expired Internet domain names are frequently re-registered and recycled by a new owner. Internet domain names must be renewed regularly in order to remain active. As a result, many domains expire and can ultimately be re-registered by any interested party on a first-come, first-served basis. Many security mechanisms use domain names to identify zones of trust, assuming perpetual domain ownership. When ownership changes, the new owner can abuse the residual trust that is still being placed in the domain. Ownership changes often occur in a highly competitive environment, and are predominantly part of speculative or ad revenue-based schemes. Second, we show that many websites include outdated or known vulnerable JavaScript libraries. Websites frequently use third-party JavaScript libraries and components such as advertisements or social media widgets. This code is executed with the same privileges as the remainder of the site. When web developers include a vulnerable version of a library, their websites may inherit the vulnerability. Furthermore, libraries are often included indirectly and perhaps unknowingly, such as by advertisement or social media widget components. In both areas, instead of focussing on a single, specific type of attack, we measure at a higher level of abstraction that captures the consequences of abandoned or neglected resources in a more general way. Our results indicate that such measurements can help better understand what drives these issues, and ultimately inform more targeted remediation efforts." @default.
- W4237385602 created "2022-05-12" @default.
- W4237385602 creator A5006316724 @default.
- W4237385602 date "2021-05-10" @default.
- W4237385602 modified "2023-10-18" @default.
- W4237385602 title "Measuring the prevalence and security implications of abandoned resources on the internet" @default.
- W4237385602 doi "https://doi.org/10.17760/d20316236" @default.
- W4237385602 hasPublicationYear "2021" @default.
- W4237385602 type Work @default.
- W4237385602 citedByCount "0" @default.
- W4237385602 crossrefType "dissertation" @default.
- W4237385602 hasAuthorship W4237385602A5006316724 @default.
- W4237385602 hasBestOaLocation W42373856021 @default.
- W4237385602 hasConcept C10138342 @default.
- W4237385602 hasConcept C108827166 @default.
- W4237385602 hasConcept C110875604 @default.
- W4237385602 hasConcept C134306372 @default.
- W4237385602 hasConcept C136764020 @default.
- W4237385602 hasConcept C144133560 @default.
- W4237385602 hasConcept C182306322 @default.
- W4237385602 hasConcept C33923547 @default.
- W4237385602 hasConcept C35026560 @default.
- W4237385602 hasConcept C36503486 @default.
- W4237385602 hasConcept C38652104 @default.
- W4237385602 hasConcept C41008148 @default.
- W4237385602 hasConcept C544833334 @default.
- W4237385602 hasConceptScore W4237385602C10138342 @default.
- W4237385602 hasConceptScore W4237385602C108827166 @default.
- W4237385602 hasConceptScore W4237385602C110875604 @default.
- W4237385602 hasConceptScore W4237385602C134306372 @default.
- W4237385602 hasConceptScore W4237385602C136764020 @default.
- W4237385602 hasConceptScore W4237385602C144133560 @default.
- W4237385602 hasConceptScore W4237385602C182306322 @default.
- W4237385602 hasConceptScore W4237385602C33923547 @default.
- W4237385602 hasConceptScore W4237385602C35026560 @default.
- W4237385602 hasConceptScore W4237385602C36503486 @default.
- W4237385602 hasConceptScore W4237385602C38652104 @default.
- W4237385602 hasConceptScore W4237385602C41008148 @default.
- W4237385602 hasConceptScore W4237385602C544833334 @default.
- W4237385602 hasLocation W42373856021 @default.
- W4237385602 hasOpenAccess W4237385602 @default.
- W4237385602 hasPrimaryLocation W42373856021 @default.
- W4237385602 hasRelatedWork W2020046386 @default.
- W4237385602 hasRelatedWork W2101374129 @default.
- W4237385602 hasRelatedWork W2142131052 @default.
- W4237385602 hasRelatedWork W2181649187 @default.
- W4237385602 hasRelatedWork W2389103123 @default.
- W4237385602 hasRelatedWork W2390384026 @default.
- W4237385602 hasRelatedWork W3082432352 @default.
- W4237385602 hasRelatedWork W4231281500 @default.
- W4237385602 hasRelatedWork W622965250 @default.
- W4237385602 hasRelatedWork W1867000646 @default.
- W4237385602 isParatext "false" @default.
- W4237385602 isRetracted "false" @default.
- W4237385602 workType "dissertation" @default.