Skip to main content

Showing 1–18 of 18 results for author: Vallina-Rodriguez, N

.
  1. arXiv:2406.00374  [pdf, other

    cs.CR

    Did I Vet You Before? Assessing the Chrome Web Store Vetting Process through Browser Extension Similarity

    Authors: José Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador

    Abstract: Web browsers, particularly Google Chrome and other Chromium-based browsers, have grown in popularity over the past decade, with browser extensions becoming an integral part of their ecosystem. These extensions can customize and enhance the user experience, providing functionality that ranges from ad blockers to, more recently, AI assistants. Given the ever-increasing importance of web browsers, di… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  2. arXiv:2306.14497  [pdf, other

    cs.CR

    Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem

    Authors: José Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, Juan Tapiador

    Abstract: Short Message Service (SMS) is a popular channel for online service providers to verify accounts and authenticate users registered to a particular service. Specialized applications, called Public SMS Gateways (PSGs), offer free Disposable Phone Numbers (DPNs) that can be used to receive SMS messages. DPNs allow users to protect their privacy when creating online accounts. However, they can also be… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  3. arXiv:2305.11506  [pdf, other

    cs.CR

    Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API

    Authors: José Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador

    Abstract: The Chromium open-source project has become a fundamental piece of the Web as we know it today, with multiple vendors offering browsers based on its codebase. One of its most popular features is the possibility of altering or enhancing the browser functionality through third-party programs known as browser extensions. Extensions have access to a wide range of capabilities through the use of APIs e… ▽ More

    Submitted 31 May, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

  4. arXiv:2302.00598  [pdf, other

    cs.SI

    Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls

    Authors: José Miguel Moreno, Sergio Pastrana, Jens Helge Reelfs, Pelayo Vallina, Andriy Panchenko, Georgios Smaragdakis, Oliver Hohlfeld, Narseo Vallina-Rodriguez, Juan Tapiador

    Abstract: During the first days of the 2022 Russian invasion of Ukraine, Russia's media regulator blocked access to many global social media platforms and news sites, including Twitter, Facebook, and the BBC. To bypass the information controls set by Russian authorities, pro-Ukrainian groups explored unconventional ways to reach out to the Russian population, such as posting war-related content in the user… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  5. arXiv:2212.03615  [pdf, other

    cs.CR

    Not Your Average App: A Large-scale Privacy Analysis of Android Browsers

    Authors: Amogh Pradeep, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, David Choffnes

    Abstract: The transparency and privacy behavior of mobile browsers has remained widely unexplored by the research community. In fact, as opposed to regular Android apps, mobile browsers may present contradicting privacy behaviors. On the one end, they can have access to (and can expose) a unique combination of sensitive user data, from users' browsing history to permission-protected personally identifiable… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: Privacy Enhancing Technologies Symposium, 2023

  6. arXiv:2211.13104  [pdf, other

    cs.CR cs.SE

    Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem

    Authors: Kaspar Hageman, Álvaro Feal, Julien Gamba, Aniketh Girish, Jakob Bleier, Martina Lindorfer, Juan Tapiador, Narseo Vallina-Rodriguez

    Abstract: The ability to identify the author responsible for a given software object is critical for many research studies and for enhancing software transparency and accountability. However, as opposed to other application markets like iOS, attribution in the Android ecosystem is known to be hard. Prior research has leveraged market metadata and signing certificates to identify software authors without que… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

  7. arXiv:2012.07695  [pdf, other

    cs.NI

    Back in control -- An extensible middle-box on your phone

    Authors: James Newman, Abbas Razaghpanah, Narseo Vallina-Rodriguez, Fabian E. Bustamante, Mark Allman, Diego Perino, Alessandro Finamore

    Abstract: The closed design of mobile devices -- with the increased security and consistent user interfaces -- is in large part responsible for their becoming the dominant platform for accessing the Internet. These benefits, however, are not without a cost. Their operation of mobile devices and their apps is not easy to understand by either users or operators. We argue for recovering transparency and contro… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: The paper is a position piece under review

  8. Understanding Incentivized Mobile App Installs on Google Play Store

    Authors: Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez

    Abstract: "Incentivized" advertising platforms allow mobile app developers to acquire new users by directly paying users to install and engage with mobile apps (e.g., create an account, make in-app purchases). Incentivized installs are banned by the Apple App Store and discouraged by the Google Play Store because they can manipulate app store metrics (e.g., install counts, appearance in top charts). Yet, ma… ▽ More

    Submitted 4 October, 2020; originally announced October 2020.

    Journal ref: ACM Internet Measurement Conference (2020)

  9. The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic

    Authors: Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis

    Abstract: Due to the COVID-19 pandemic, many governments imposed lock downs that forced hundreds of millions of citizens to stay at home. The implementation of confinement measures increased Internet traffic demands of residential users, in particular, for remote working, entertainment, commerce, and education, which, as a result, caused traffic shifts in the Internet core. In this paper, using data from a… ▽ More

    Submitted 5 October, 2020; v1 submitted 25 August, 2020; originally announced August 2020.

    Journal ref: Proceedings of the 2020 Internet Measurement Conference (IMC '20)

  10. arXiv:1907.12762  [pdf, other

    cs.CR cs.NI

    The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods

    Authors: Ralph Holz, Johanna Amann, Abbas Razaghpanah, Narseo Vallina-Rodriguez

    Abstract: TLS 1.3 marks a significant departure from previous versions of the Transport Layer Security protocol (TLS). The new version offers a simplified protocol flow, more secure cryptographic primitives, and new features to improve performance, among other things. In this paper, we conduct the first study of TLS 1.3 deployment and use since its standardization by the IETF. We use active scans to measure… ▽ More

    Submitted 6 August, 2019; v1 submitted 30 July, 2019; originally announced July 2019.

  11. arXiv:1906.09682  [pdf, other

    cs.CR

    Encrypted DNS --> Privacy? A Traffic Analysis Perspective

    Authors: Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso

    Abstract: Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship. To address these issues, large organizations such as Google and Cloudflare are deploying recently standardized protocols that encrypt DNS traffic between end users and recursive resolvers such a… ▽ More

    Submitted 6 October, 2019; v1 submitted 23 June, 2019; originally announced June 2019.

  12. arXiv:1905.02713  [pdf, other

    cs.CR

    An Analysis of Pre-installed Android Software

    Authors: Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez

    Abstract: The open-source nature of the Android OS makes it possible for manufacturers to ship custom versions of the OS along with a set of pre-installed apps, often for product differentiation. Some device vendors have recently come under scrutiny for potentially invasive private data collection practices and other potentially harmful or unwanted behavior of the pre-installed apps on their devices. Yet, t… ▽ More

    Submitted 7 May, 2019; originally announced May 2019.

    Journal ref: 41st IEEE Symposium on Security and Privacy, 18-20 May 2020, San Fransisco, CA, USA

  13. arXiv:1810.07780  [pdf, other

    cs.NI cs.CR cs.CY

    Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets

    Authors: Haoyu Wang, Zhe Liu, **gyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, **gcun Cao, Guoai Xu

    Abstract: China is one of the largest Android markets in the world. As Chinese users cannot access Google Play to buy and install Android apps, a number of independent app stores have emerged and compete in the Chinese app market. Some of the Chinese app stores are pre-installed vendor-specific app markets (e.g., Huawei, Xiaomi and OPPO), whereas others are maintained by large tech companies (e.g., Baidu, Q… ▽ More

    Submitted 26 September, 2018; originally announced October 2018.

    Comments: To appear in the Proceedings of the 2018 Internet Measurement Conference (IMC)

  14. A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists

    Authors: Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, Narseo Vallina-Rodriguez

    Abstract: A broad range of research areas including Internet measurement, privacy, and network security rely on lists of target domains to be analysed; researchers make use of target lists for reasons of necessity or efficiency. The popular Alexa list of one million domains is a widely used example. Despite their prevalence in research papers, the soundness of top lists has seldom been questioned by the com… ▽ More

    Submitted 23 September, 2018; v1 submitted 29 May, 2018; originally announced May 2018.

    Comments: To be published at ACM IMC 2018. Web site with live data under: https://toplists.github.io

  15. arXiv:1609.07190  [pdf, other

    cs.CY

    Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem

    Authors: Narseo Vallina-Rodriguez, Srikanth Sundaresan, Abbas Razaghpanah, Rishab Nithyanand, Mark Allman, Christian Kreibich, Phillipa Gill

    Abstract: Third-party services form an integral part of the mobile ecosystem: they allow app developers to add features such as performance analytics and social network integration, and to monetize their apps by enabling user tracking and targeted ad delivery. At present users, researchers, and regulators all have at best limited understanding of this third-party ecosystem. In this paper we seek to shrink t… ▽ More

    Submitted 26 October, 2016; v1 submitted 22 September, 2016; originally announced September 2016.

  16. A Multi-perspective Analysis of Carrier-Grade NAT Deployment

    Authors: Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson

    Abstract: As ISPs face IPv4 address scarcity they increasingly turn to network address translation (NAT) to accommodate the address needs of their customers. Recently, ISPs have moved beyond employing NATs only directly at individual customers and instead begun deploying Carrier-Grade NATs (CGNs) to apply address translation to many independent and disparate endpoints spanning physical locations, a phenomen… ▽ More

    Submitted 13 September, 2016; v1 submitted 18 May, 2016; originally announced May 2016.

    Journal ref: Proceedings of ACM IMC 2016

  17. arXiv:1605.05077  [pdf, other

    cs.CR cs.CY cs.NI

    Ad-Blocking and Counter Blocking: A Slice of the Arms Race

    Authors: Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch

    Abstract: Adblocking tools like Adblock Plus continue to rise in popularity, potentially threatening the dynamics of advertising revenue streams. In response, a number of publishers have ramped up efforts to develop and deploy mechanisms for detecting and/or counter-blocking adblockers (which we refer to as anti-adblockers), effectively escalating the online advertising arms race. In this paper, we develop… ▽ More

    Submitted 20 July, 2016; v1 submitted 17 May, 2016; originally announced May 2016.

    Comments: To appear in the Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 2016)

  18. arXiv:1510.01419  [pdf, other

    cs.NI

    Haystack: A Multi-Purpose Mobile Vantage Point in User Space

    Authors: Abbas Razaghpanah, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Phillipa Gill, Mark Allman, Vern Paxson

    Abstract: Despite our growing reliance on mobile phones for a wide range of daily tasks, their operation remains largely opaque. A number of previous studies have addressed elements of this problem in a partial fashion, trading off analytic comprehensiveness and deployment scale. We overcome the barriers to large-scale deployment (e.g., requiring rooted devices) and comprehensiveness of previous efforts by… ▽ More

    Submitted 29 October, 2016; v1 submitted 5 October, 2015; originally announced October 2015.

    Comments: 13 pages incl. figures