1

Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service pr ovider networks

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?

Understanding iot security through the data crystal ball: Where we are now and where we are going to be

Inspired by the boom of the consumer IoT market, many device manufacturers, new start-up companies and technology behemoths have jumped into the space. Indeed, in a span of less than 5 years, we have experienced the manifestation of an array of …

SMig: Stream Migration Extension For HTTP/2

HTTP/2 is quickly replacing HTTP/1.1, the protocol that supports the WWW for the past 17 years. However, HTTP/2’s connection management and multiplexing schemes often incur unexpected cross-layer interactions. In this paper, we propose SMig, an …