Skip to main content

Showing 1–6 of 6 results for author: Saidi, S J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.09918  [pdf, other

    cs.NI

    Analyzing IoT Hosts in the IPv6 Internet

    Authors: Peter Jose, Said Jawad Saidi, Oliver Gasser

    Abstract: Users and businesses are increasingly deploying Internet of Things (IoT) devices at home, at work, and in factories. At the same time, we see an increase in the use of IPv6 for Internet connectivity. Even though the IoT ecosystem has been the focus of recent studies, there is no comprehensive analysis of IoT end-hosts in the IPv6 Internet to date. In this paper we perform an in-depth analysis of I… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  2. Deep Dive into the IoT Backend Ecosystem

    Authors: Said Jawad Saidi, Srdjan Matic, Oliver Gasser, Georgios Smaragdakis, Anja Feldmann

    Abstract: Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate IoT backends -- the focus of this paper. We propose a methodology to identify and locate them by (a) compiling a list of domains used exclusively… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 2022 ACM Internet Measurement Conference (IMC '22)

  3. arXiv:2203.08946  [pdf, other

    cs.CR cs.NI

    One Bad Apple Can Spoil Your IPv6 Privacy

    Authors: Said Jawad Saidi, Oliver Gasser, Georgios Smaragdakis

    Abstract: IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that have already been installed at home. Unfortunately, we find that the privacy of a substantial fraction of end-users is still at risk, despite the efforts by ISPs and electronic vendors to improve end-user security, e.g., by adopting prefix rotation and IPv6 privacy extensions. By analyzing passive data fr… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Accepted at ACM SIGCOMM Computer Communication Review, to appear in the April 2022 issue

  4. Exploring Network-Wide Flow Data with Flowyager

    Authors: Said Jawad Saidi, Aniss Maghsoudlou, Damien Foucard, Georgios Smaragdakis, Ingmar Poese, Anja Feldmann

    Abstract: Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and… ▽ More

    Submitted 27 October, 2020; v1 submitted 25 October, 2020; originally announced October 2020.

    Comments: accepted at IEEE TNSM Journal DOI added

  5. arXiv:2009.01880  [pdf, other

    cs.NI

    A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild

    Authors: Said Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David Choffnes, Georgios Smaragdakis, Anja Feldmann

    Abstract: Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know w… ▽ More

    Submitted 30 September, 2020; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: Accepted at the ACM Internet Measurement Conference 2020 (IMC'20)

  6. Consistent SDNs through Network State Fuzzing

    Authors: Apoorv Shukla, Said Jawad Saidi, Stefan Schmid, Marco Canini, Thomas Zinner, Anja Feldmann

    Abstract: The conventional wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Unfortunately, bugs, misconfigurations, faults or attacks can introduce inconsistencies that undermine correct operation. Previous work in this area, however, lacks a holistic methodology to tackle th… ▽ More

    Submitted 2 May, 2020; v1 submitted 18 April, 2019; originally announced April 2019.

    Comments: Added three extra relevant references, the arXiv later was accepted in IEEE Transactions of Network and Service Management (TNSM), 2019 with the title "Towards Consistent SDNs: A Case for Network State Fuzzing"

    Journal ref: IEEE Transactions on Network and Service Management 2019