G43C22001370007, Code ECS00000037); ii) SER-
ICS (PE00000014) under the NRRP MUR program
funded by the EU – NextGenerationEU; iii) 1H-HUB
and SOV-EDGE-HUB funded by Universit
`
a degli
Studi di Milano – PSR 2021/2022 – GSA – Linea 6;
and iv) program “piano sostegno alla ricerca” funded
by Universit
`
a degli Studi di Milano.
REFERENCES
Anisetti, M., Ardagna, C. A., Berto, F., and Damiani, E.
(2021). Security Certification Scheme for Content-
centric Networks. In 2021 IEEE International Confer-
ence on Services Computing (SCC), pages 203–212,
Chicago, IL, USA. IEEE.
Anisetti, M., Ardagna, C. A., Berto, F., and Damiani,
E. (2022). A Security Certification Scheme for
Information-Centric Networks. IEEE Trans. Netw.
Serv. Manage., 19(3):2397–2408.
Barron, T., So, J., and Nikiforakis, N. (2021). Click This,
Not That: Extending Web Authentication with De-
ception. In Proceedings of the 2021 ACM Asia Con-
ference on Computer and Communications Security,
ASIA CCS ’21, pages 462–474, New York, NY, USA.
Association for Computing Machinery.
Chankhunthod, A., Danzig, P. B., Neerdaels, C., Schwartz,
M. F., and Worrell, K. J. (1996). A Hierarchical Inter-
net Object Cache. In Proceedings of the 1996 annual
conference on USENIX Annual Technical Conference,
volume 164 of ATEC ’96, page 13, USA. USENIX
Association.
Cui, Y., Cui, J., and Hu, J. (2020). A Survey on XSS At-
tack Detection and Prevention in Web Applications.
In Proceedings of the 2020 12th International Confer-
ence on Machine Learning and Computing, ICMLC
’20, pages 443–449, New York, NY, USA. Associa-
tion for Computing Machinery.
Ghaznavi, M., Jalalpour, E., Salahuddin, M. A., Boutaba,
R., Migault, D., and Preda, S. (2021). Content Deliv-
ery Network Security: A Survey. IEEE Communica-
tions Surveys & Tutorials, 23(4):2166–2190. Confer-
ence Name: IEEE Communications Surveys & Tuto-
rials.
Gil, O. (2017). Web Cache Deception Attack. In Proceed-
ings of Black Hat 2017 US.
Gupta, S., Singhal, A., and Kapoor, A. (2016). A liter-
ature survey on social engineering attacks: Phishing
attack. In Proceedings of 2016 International Confer-
ence on Computing, Communication and Automation
(ICCCA), pages 537–540.
Hildebrand, M. (2021). Automated Scanning for Web Cache
Poisoning Vulnerabilities. PhD thesis, Technische
Universit
¨
at Dortmund.
Jabiyev, B., Sprecher, S., Onarlioglu, K., and Kirda, E.
(2021). T-Reqs: HTTP Request Smuggling with Dif-
ferential Fuzzing. In Proceedings of the 2021 ACM
SIGSAC Conference on Computer and Communica-
tions Security, CCS ’21, pages 1805–1820, New York,
NY, USA. Association for Computing Machinery.
Lin, S., Xin, R., Goel, A., and Yang, X. (2022). Invi-
Cloak: An End-to-End Approach to Privacy and Per-
formance in Web Content Distribution. In Proceed-
ings of the 2022 ACM SIGSAC Conference on Com-
puter and Communications Security, CCS ’22, pages
1947–1961, New York, NY, USA. Association for
Computing Machinery.
Liu, M., Zhang, B., Chen, W., and Zhang, X. (2019).
A Survey of Exploitation and Detection Methods of
XSS Vulnerabilities. IEEE Access, 7:182004–182016.
Conference Name: IEEE Access.
Ma, Y., Zhong, G., Liu, W., Sun, J., and Huang, K. (2020).
Neural CAPTCHA networks. Applied Soft Comput-
ing, 97:106769.
Mirheidari, S. A., Arshad, S., Onarlioglu, K., Crispo, B.,
Kirda, E., and Robertson, W. (2020). Cached and
Confused: Web Cache Deception in the Wild. In
Proceedings of the 29th USENIX Security Symposium
(USENIX Security 20), pages 665–682.
Mirheidari, S. A., Golinelli, M., Onarlioglu, K., Kirda, E.,
and Crispo, B. (2022). Web Cache Deception Esca-
lates! In Proceedings of the 31st USENIX Security
Symposium (USENIX Security 22), pages 179–196.
Nguyen, H. V., Iacono, L. L., and Federrath, H. (2019a).
Mind the cache: large-scale explorative study of web
caching. In Proceedings of the 34th ACM/SIGAPP
Symposium on Applied Computing, SAC ’19, pages
2497–2506, New York, NY, USA. Association for
Computing Machinery.
Nguyen, H. V., Iacono, L. L., and Federrath, H. (2019b).
Your Cache Has Fallen: Cache-Poisoned Denial-of-
Service Attack. In Proceedings of the 2019 ACM
SIGSAC Conference on Computer and Communica-
tions Security, CCS ’19, pages 1915–1936, New York,
NY, USA. Association for Computing Machinery.
Shrivastava, A., Choudhary, S., and Kumar, A. (2016). XSS
vulnerability assessment and prevention in web appli-
cation. In 2016 2nd International Conference on Next
Generation Computing Technologies (NGCT), pages
850–853.
Smith, J., Calvert, K., Murphy, S., Orman, H., and Pe-
terson, L. (1999). Activating networks: a progress
report. Computer, 32(4):32–41. Conference Name:
Computer.
Yang, L., Moubayed, A., Shami, A., Heidari, P.,
Boukhtouta, A., Larabi, A., Brunner, R., Preda, S.,
and Migault, D. (2022). Multi-Perspective Content
Delivery Networks Security Framework Using Op-
timized Unsupervised Anomaly Detection. IEEE
Transactions on Network and Service Management,
19(1):686–705. Conference Name: IEEE Transac-
tions on Network and Service Management.
Zolfaghari, B., Srivastava, G., Roy, S., Nemati, H. R.,
Afghah, F., Koshiba, T., Razi, A., Bibak, K., Mitra,
P., and Rai, B. K. (2020). Content Delivery Networks:
State of the Art, Trends, and Future Roadmap. ACM
Comput. Surv., 53(2):34:1–34:34.
CLOSER 2024 - 14th International Conference on Cloud Computing and Services Science
238