Skip to content

Research

Page 19 of 21

Fingerprinting Browsers in Encrypted Communications

research note

Fingerprinting Browsers in Encrypted Communications

·7 min read·Sandhya Aneja, Nagender Aneja

This paper asks whether browsers can still be distinguished when all traffic is encrypted with HTTPS over TLS 1.3, using only observable packet/message lengths rather than plaintext HTTP headers or…

researchbrowser-fingerprintingtls-1.3encrypted-trafficpassive-fingerprinting

Read note → Source paper ↗

Sybil Detection using Graph Neural Networks

research note

Sybil Detection using Graph Neural Networks

·11 min read·Stuart Heeb, Andreas Plesner, Roger Wattenhofer

This paper asks whether graph neural networks can do structure-only Sybil detection better than the classic random-walk / belief-propagation family when the attacker adds many attack edges or uses …

researchsybil-detectiongraph-neural-networksgraph-attentionsocial-network-security

Read note → Source paper ↗

Conceptual Design and Implementation of FIDO2 compatible Smart Card for Decentralized Financial Transaction System

research note

Conceptual Design and Implementation of FIDO2 compatible Smart Card for Decentralized Financial Transaction System

·7 min read·Anisha Ghosh, Aditya Mitra, Sibi Chakkaravarthy Sethuraman et al.

This paper addresses the persistent security and authentication vulnerabilities in current online banking and decentralized financial transaction systems, focusing particularly on phishing, passwor…

researchfido2-authenticationpasswordless-securitysmart-cardsfintech-security

Read note → Source paper ↗

Articles are CC BY 4.0 — feel free to quote with attribution