Evaluating the Long-term Effects
- f Parameters on the Characteristics
- f the Tranco Top Sites Ranking
Victor Le Pochat, Tom Van Goethem, Wouter Joosen
CSET 2019, 12 August 2019
Evaluating the Long-term Effects of Parameters on the - - PowerPoint PPT Presentation
Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking Victor Le Pochat , Tom Van Goethem, Wouter Joosen CSET 2019, 12 August 2019 Security researchers rely on top websites rankings We perform a
Victor Le Pochat, Tom Van Goethem, Wouter Joosen
CSET 2019, 12 August 2019
2
[Kon18, Kha18, Rim18]
[LeP19, Sch18, Rwe19]
3
4
[Le Pochat et al. Tranco: a research-oriented top sites ranking hardened against manipulation. NDSS 2019]
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Victor.LePochat@cs.kuleuven.be @VictorLePochat
1. [Kon18] Konoth, R.K., Vineti, E., Moonsamy, V., Lindorfer, M., Kruegel, C., Bos, H., and Vigna, G., “MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense,” in Proc. CCS, 2018, pp. 1714-1730. DOI: 10.1145/3243734.3243858 2. [Kha18] Kharraz, A., Robertson, W., and Kirda, E., “Surveylance: Automatically Detecting Online Survey Scams,” in
3. [Rim18] Rimmer, V., Preuveneers, D., Juarez, M., Van Goethem, T., and Joosen, W., Automated website fingerprinting through deep learning,” in Proc. NDSS, 2018. DOI: 10.14722/ndss.2018.23105 4. [LeP19] Le Pochat, V., Van Goethem, T., Tajalizadehkhoob, S., Korczyński, M., Joosen, W.: Tranco: a research-
Symposium, February 2019. https://doi.org/10.14722/ndss.2019.23386 5. [Sch18] Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, and Narseo Vallina-Rodriguez. A long way to the top: Significance, structure, and stability of Internet top lists. In Internet Measurement Conference, pages 478–493, 2018. 6. [Rwe19] Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William Robertson, and Engin Kirda. Clustering and the weekend effect: Recommendations for the use of top domain lists in security research. In 20th International Conference
27