Internet Security

Recent Courses

Summer 2025

Winter 2024/2025

Publications

Peer-Reviewed

Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols

Carlotta Tagliaro, Martina Komsic, Andrea Continella, Kevin Borgolte, Martina Lindorfer

Proceedings of the 27th International Symposium on Recent Advances in Intrusion Detection (RAID), September 2024

Are You Sure You Want To Do Coordinated Vulnerability Disclosure?

Ting-Han Chen, Carlotta Tagliaro, Martina Lindorfer, Kevin Borgolte, Jeroen van der Ham-de Vos

Proceedings of the 9th International Workshop on Traffic Measurements for Cybersecurity (WTMC), July 2024

IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis

David Schmidt, Carlotta Tagliaro, Kevin Borgolte, Martina Lindorfer

Proceedings of the 30th ACM SIGSAC Conference on Computer and Communications Security (CCS), November 2023

Pushing Boundaries: An Empirical View on the Digital Sovereignty of Six Governments in the Midst of Geopolitical Tensions

Bernardus Jansen, Natalia Kadenko, Dennis Broeders, Michel van Eeten, Kevin Borgolte, Tobias Fiebig

Government Information Quarterly (GIQ) (Volume 40, Issue 4), August 2023

Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale

Stijn Pletinckx, Kevin Borgolte, Tobias Fiebig

Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS), November 2021

Designing for Tussle in Encrypted DNS

Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster

Proceedings of the 20th Workshop on Hot Topics in Networking (HotNets), November 2021

Encryption without Centralization: Distributing DNS Queries Across Recursive Resolvers

Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster

Proceedings of the 2021 Applied Networking Research Workshop (ANRW), July 2021

Extended abstract. Co-located with IETF 105.

Can Encrypted DNS Be Fast?

Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster

Proceedings of the 22nd Passive and Active Measurement (PAM), March 2021

Those Who Know Don't, Those Who Don't Know Deploy: Understanding Security Awareness in the Adoption of Industrial IoT

Verena Schrama, Carlos H. Gañán, Doris Aschenbrenner, Mark de Reuver, Kevin Borgolte, Tobias Fiebig

Proceedings of the 20th Workshop on the Economics of Information Security (WEIS), December 2020

Identifying Disinformation Websites Using Infrastructure Features

Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan Mayer

Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, August 2020

Understanding The Performance Costs and Benefits of Privacy-focused Browser Extensions

Kevin Borgolte, Nick Feamster

Proceedings of the 29th The Web Conference (TheWebConf, formerly known as WWW), April 2020

Comparing the Effects of DNS, DoT, and DoH on Web Performance

Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster

Proceedings of the 29th The Web Conference (TheWebConf, formerly known as WWW), April 2020

How DNS over HTTPS is Reshaping Privacy, Performance, and Policy in the Internet Ecosystem

Kevin Borgolte, Tithi Chattopadhyay, Nick Feamster, Mihir Kshirsagar, Jordan Holland, Austin Hounsel, Paul Schmitt

Proceedings of the 47th Research Conference on Communications, Information and Internet Policy (TPRC), September 2019

Authors listed alphabetically.

Analyzing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web

Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster

Proceedings of the 2019 Applied Networking Research Workshop (ANRW), July 2019

Extended abstract. Co-located with IETF 105.

Investigating Operators' Perspective on Security Misconfigurations

Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig

Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS), October 2018

Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates

Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna

Proceedings of the 2018 Applied Networking Research Workshop (ANRW), July 2018

Extended abstract. Co-located with IETF 102.

Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

Kevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna

Proceedings of the 39th IEEE Symposium on Security & Privacy (S&P), May 2018

In rDNS We Trust: Revisiting a Common Data-Source's Reliability

Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna, Anja Feldmann

Proceedings of the 19th Passive and Active Measurement (PAM), March 2018

Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates

Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna

Proceedings of the 25th Network and Distributed System Security Symposium (NDSS), February 2018

Something From Nothing (There): Collecting Global IPv6 Datasets From DNS

Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna

Proceedings of the 18th Passive and Active Measurement (PAM), March 2017

Drops for Stuff: An Analysis of Reshipping Mule Scams

Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna

Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), October 2015

Meerkat: Detecting Website Defacements through Image-based Object Recognition

Kevin Borgolte, Christopher Kruegel, Giovanni Vigna

Proceedings of the 24th USENIX Security Symposium (USENIX Security), August 2015

Internet Defense Prize Finalist.

Protecting Web Single Sign-on against Relying Party Impersonation Attacks through a Bi-directional Secure Channel with Authentication

Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Kruegel, Giovanni Vigna, Yan Chen

Proceedings of the 17th International Symposium on Recent Advances in Intrusion Detection (RAID), September 2014

Ten Years of iCTF: The Good, The Bad, and The Ugly

Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili

Proceedings of the 1st USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE), August 2014

Relevant Change Detection: Framework for the Precise Extraction of Modified and Novel Web-based Content as a Filtering Technique for Analysis Engines

Kevin Borgolte, Christopher Kruegel, Giovanni Vigna

Proceedings of the 23rd World Wide Web Conference (WWW), April 2014

Developers' Track.

Delta: Automatic Identification of Unknown Web-based Infection Campaigns

Kevin Borgolte, Christopher Kruegel, Giovanni Vigna

Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS), November 2013

Preprints

Classifying Network Vendors at Internet Scale

Jordan Holland, Ross Teixera, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, Jonathan Mayer

June 2020