RSA vs ECDSA for DNSSEC
Measuring whether we should use ECDSA.
Measuring whether we should use ECDSA.
Guest Post: Study shows adding a TLS-protected email or FTP server to a network can enable cookie-stealing or cross-site scripting attacks against web servers in the same network.
Guest Post: There are several ways attackers can force TCP to fragment for inclusion in IP fragmentation attacks.
Guest Post: BBR for DCCP reduces latency in multi-path scenarios providing stability to carry TCP streams on top of CCID5 controlled DCCP tunnels.
Guest Post: Improving network performance has 3x greater effect on high-end phones than low-end phones.
Guest Post: Context is everything when it comes to assessing anycast.
Guest Post: Study shows clients can distribute DNS queries across a set of popular recursive resolvers without performance degradation.
Guest Post: Eleven-year study characterizes the rise of heavy hitters and big-fast TCP flows.
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Guest Post: Institutions that run their own recursive resolvers and route from their own AS are most susceptible to privacy risks.