Search Results - "Izhikevich, Katherine"
-
1
The molecular epidemiology of multiple zoonotic origins of SARS-CoV-2
Published in Science (American Association for the Advancement of Science) (26-08-2022)“…Understanding the circumstances that lead to pandemics is important for their prevention. We analyzed the genomic diversity of severe acute respiratory…”
Get full text
Journal Article -
2
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild
Published 01-01-2024“…In this thesis, we analyze to what extent actors target poorly-secured cloud storage buckets for attack. We deployed hundreds of AWS S3 honeybuckets with…”
Get full text
Dissertation -
3
Trust, But Verify, Operator-Reported Geolocation
Published 27-09-2024“…Geolocation plays a critical role in understanding the Internet. In this work, we provide an in-depth analysis of operator-misreported geolocation. Using a…”
Get full text
Journal Article -
4
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild
Published in 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P) (08-07-2024)“…In this work, we analyze to what extent actors target poorly-secured cloud storage buckets for attack. We deployed hundreds of AWS S3 honeybuckets with…”
Get full text
Conference Proceeding -
5
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild
Published 01-12-2023“…In this work, we analyze to what extent actors target poorly-secured cloud storage buckets for attack. We deployed hundreds of AWS S3 honeybuckets with…”
Get full text
Journal Article -
6
Democratizing LEO Satellite Network Measurement
Published 12-06-2023“…ACM SIGMETRICS/IFIP Performance 2024 Low Earth Orbit (LEO) satellite networks are quickly gaining traction with promises of impressively low latency, high…”
Get full text
Journal Article -
7
Count of Monte Crypto: Accounting-based Defenses for Cross-Chain Bridges
Published 01-10-2024“…Between 2021 and 2023, crypto assets valued at over \$US2.6 billion were stolen via attacks on "bridges" -- decentralized services designed to allow…”
Get full text
Journal Article