Understanding the mirai botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... 26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017 | 1952 | 2017 |
The Security Impact of HTTPS Interception. Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ... NDSS, 2017 | 179 | 2017 |
Adaptive secondary authentication criteria based on account data JG Mclachlan, AJ Farrugia, NT Sullivan US Patent 9,043,887, 2015 | 162 | 2015 |
Secure session capability using public-key cryptography without access to the private key SAH Pahl, MPF Tourne, P Sikora, RR Bejjani, DO Knecht, MB Prince, ... US Patent 9,184,911, 2015 | 92 | 2015 |
Privacy Pass: Bypassing Internet Challenges Anonymously. A Davidson, I Goldberg, N Sullivan, G Tankersley, F Valsorda Proc. Priv. Enhancing Technol. 2018 (3), 164-180, 2018 | 79 | 2018 |
Transparent DNSSEC-signing proxy NT Sullivan, O Gudmundsson, F Valsorda US Patent 10,033,699, 2018 | 63 | 2018 |
RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins T Chung, E Aben, T Bruijnzeels, B Chandrasekaran, D Choffnes, D Levin, ... Proceedings of the Internet Measurement Conference, 406-419, 2019 | 59 | 2019 |
Protocols for checking compromised credentials L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 57 | 2019 |
TLS encrypted client hello E Rescorla, K Oku, N Sullivan, CA Wood Working Draft, IETF Secretariat, Internet-Draft draft-ietftls-esni-09. txt, 2020 | 50 | 2020 |
Encrypted server name indication for TLS 1.3 E Rescorla, K Oku, N Sullivan, CA Wood IETF draft. Available at: https://tools. ietf. org/html/draft-ietf-tls-esni …, 2019 | 48 | 2019 |
403 forbidden: A global view of cdn geoblocking A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ... Proceedings of the Internet Measurement Conference 2018, 218-230, 2018 | 48 | 2018 |
Is the web ready for ocsp must-staple? T Chung, J Lok, B Chandrasekaran, D Choffnes, D Levin, BM Maggs, ... Proceedings of the Internet Measurement Conference 2018, 105-118, 2018 | 43 | 2018 |
A (relatively easy to understand) primer on elliptic curve cryptography N Sullivan Ars Technica, 2013 | 41 | 2013 |
Hashing to elliptic curves A Faz-Hernandez, S Scott, N Sullivan, RS Wahby, CA Wood Internet Research Task Force, Informational, 2021 | 40 | 2021 |
In search of CurveSwap: Measuring elliptic curve implementations in the wild L Valenta, N Sullivan, A Sanso, N Heninger 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 384-398, 2018 | 29 | 2018 |
An analysis of TLS handshake proxying D Stebila, N Sullivan 2015 IEEE Trustcom/BigDataSE/ISPA 1, 279-286, 2015 | 28 | 2015 |
Multiply-encrypting data requiring multiple keys for decryption NT Sullivan US Patent 9,639,687, 2017 | 22 | 2017 |
Oblivious dns over https (odoh): A practical privacy enhancement to dns S Singanamalla, S Chunhapanya, M Vavruša, T Verma, P Wu, M Fayed, ... arXiv preprint arXiv:2011.10121, 2020 | 18 | 2020 |
Keyless SSL: The nitty gritty technical details N Sullivan CloudFlare blog, 2014 | 18 | 2014 |
Secure session capability using public-key cryptography without access to the private key SAH Pahl, MPF Tourne, P Sikora, RR Bejjani, DO Knecht, MB Prince, ... US Patent 10,009,183, 2018 | 17 | 2018 |