Skip to main content

Showing 1–4 of 4 results for author: Matic, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.14497  [pdf, other

    cs.CR

    Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem

    Authors: José Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, Juan Tapiador

    Abstract: Short Message Service (SMS) is a popular channel for online service providers to verify accounts and authenticate users registered to a particular service. Specialized applications, called Public SMS Gateways (PSGs), offer free Disposable Phone Numbers (DPNs) that can be used to receive SMS messages. DPNs allow users to protect their privacy when creating online accounts. However, they can also be… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  2. Deep Dive into the IoT Backend Ecosystem

    Authors: Said Jawad Saidi, Srdjan Matic, Oliver Gasser, Georgios Smaragdakis, Anja Feldmann

    Abstract: Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate IoT backends -- the focus of this paper. We propose a methodology to identify and locate them by (a) compiling a list of domains used exclusively… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 2022 ACM Internet Measurement Conference (IMC '22)

  3. The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools

    Authors: Juan Caballero, Gibran Gomez, Srdjan Matic, Gustavo Sánchez, Silvia Sebastián, Arturo Villacañas

    Abstract: To adapt to a constantly evolving landscape of cyber threats, organizations actively need to collect Indicators of Compromise (IOCs), i.e., forensic artifacts that signal that a host or network might have been compromised. IOCs can be collected through open-source and commercial structured IOC feeds. But, they can also be extracted from a myriad of unstructured threat reports written in natural la… ▽ More

    Submitted 8 March, 2023; v1 submitted 29 July, 2022; originally announced August 2022.

    Journal ref: Future Generation Computer Systems, Volume 144, 2023, Pages 74-89

  4. Pythia: a Framework for the Automated Analysis of Web Hosting Environments

    Authors: Srdjan Matic, Gareth Tyson, Gianluca Stringhini

    Abstract: A common approach when setting up a website is to utilize third party Web hosting and content delivery networks. Without taking this trend into account, any measurement study inspecting the deployment and operation of websites can be heavily skewed. Unfortunately, the research community lacks generalizable tools that can be used to identify how and where a given website is hosted. Instead, a numbe… ▽ More

    Submitted 13 May, 2019; v1 submitted 16 March, 2019; originally announced March 2019.