Zum Hauptinhalt springen

Showing 1–8 of 8 results for author: Razaghpanah, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2012.07695  [pdf, other

    cs.NI

    Back in control -- An extensible middle-box on your phone

    Authors: James Newman, Abbas Razaghpanah, Narseo Vallina-Rodriguez, Fabian E. Bustamante, Mark Allman, Diego Perino, Alessandro Finamore

    Abstract: The closed design of mobile devices -- with the increased security and consistent user interfaces -- is in large part responsible for their becoming the dominant platform for accessing the Internet. These benefits, however, are not without a cost. Their operation of mobile devices and their apps is not easy to understand by either users or operators. We argue for recovering transparency and contro… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: The paper is a position piece under review

  2. arXiv:1907.12762  [pdf, other

    cs.CR cs.NI

    The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods

    Authors: Ralph Holz, Johanna Amann, Abbas Razaghpanah, Narseo Vallina-Rodriguez

    Abstract: TLS 1.3 marks a significant departure from previous versions of the Transport Layer Security protocol (TLS). The new version offers a simplified protocol flow, more secure cryptographic primitives, and new features to improve performance, among other things. In this paper, we conduct the first study of TLS 1.3 deployment and use since its standardization by the IETF. We use active scans to measure… ▽ More

    Submitted 6 August, 2019; v1 submitted 30 July, 2019; originally announced July 2019.

  3. arXiv:1907.04245  [pdf, other

    cs.CR cs.CY cs.NI cs.SI

    ICLab: A Global, Longitudinal Internet Censorship Measurement Platform

    Authors: Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill

    Abstract: Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail for breadth of coverage. Collecting enough data for a comprehensive, global, longitudinal perspective remains challenging. In this work, we present ICLab, a… ▽ More

    Submitted 10 July, 2019; v1 submitted 9 July, 2019; originally announced July 2019.

    Comments: To appear in Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland 2020). San Francisco, CA. May 2020

  4. arXiv:1905.02713  [pdf, other

    cs.CR

    An Analysis of Pre-installed Android Software

    Authors: Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez

    Abstract: The open-source nature of the Android OS makes it possible for manufacturers to ship custom versions of the OS along with a set of pre-installed apps, often for product differentiation. Some device vendors have recently come under scrutiny for potentially invasive private data collection practices and other potentially harmful or unwanted behavior of the pre-installed apps on their devices. Yet, t… ▽ More

    Submitted 7 May, 2019; originally announced May 2019.

    Journal ref: 41st IEEE Symposium on Security and Privacy, 18-20 May 2020, San Fransisco, CA, USA

  5. arXiv:1706.07600  [pdf, other

    cs.CR

    A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography

    Authors: Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill

    Abstract: Recent years have seen the Internet become a key vehicle for citizens around the globe to express political opinions and organize protests. This fact has not gone unnoticed, with countries around the world repurposing network management tools (e.g., URL filtering products) and protocols (e.g., BGP, DNS) for censorship. However, repurposing these products can have unintended international impact, w… ▽ More

    Submitted 23 June, 2017; originally announced June 2017.

  6. arXiv:1609.07190  [pdf, other

    cs.CY

    Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem

    Authors: Narseo Vallina-Rodriguez, Srikanth Sundaresan, Abbas Razaghpanah, Rishab Nithyanand, Mark Allman, Christian Kreibich, Phillipa Gill

    Abstract: Third-party services form an integral part of the mobile ecosystem: they allow app developers to add features such as performance analytics and social network integration, and to monetize their apps by enabling user tracking and targeted ad delivery. At present users, researchers, and regulators all have at best limited understanding of this third-party ecosystem. In this paper we seek to shrink t… ▽ More

    Submitted 26 October, 2016; v1 submitted 22 September, 2016; originally announced September 2016.

  7. arXiv:1606.01979  [pdf, other

    cs.NI cs.CY

    Exploring the Design Space of Longitudinal Censorship Measurement Platforms

    Authors: Abbas Razaghpanah, Anke Li, Arturo Filastò, Rishab Nithyanand, Vasilis Ververis, Will Scott, Phillipa Gill

    Abstract: Despite the high perceived value and increasing severity of online information controls, a data-driven understanding of the phenomenon has remained elusive. In this paper, we consider two design points in the space of Internet censorship measurement with particular emphasis on how they address the challenges of locating vantage points, choosing content to test, and analyzing results. We discuss th… ▽ More

    Submitted 29 October, 2016; v1 submitted 6 June, 2016; originally announced June 2016.

    Comments: 7 pages

  8. arXiv:1510.01419  [pdf, other

    cs.NI

    Haystack: A Multi-Purpose Mobile Vantage Point in User Space

    Authors: Abbas Razaghpanah, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Phillipa Gill, Mark Allman, Vern Paxson

    Abstract: Despite our growing reliance on mobile phones for a wide range of daily tasks, their operation remains largely opaque. A number of previous studies have addressed elements of this problem in a partial fashion, trading off analytic comprehensiveness and deployment scale. We overcome the barriers to large-scale deployment (e.g., requiring rooted devices) and comprehensiveness of previous efforts by… ▽ More

    Submitted 29 October, 2016; v1 submitted 5 October, 2015; originally announced October 2015.

    Comments: 13 pages incl. figures