Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David Adrian is active.

Publication


Featured researches published by David Adrian.


internet measurement conference | 2014

The Matter of Heartbleed

Zakir Durumeric; Frank Li; James Kasten; Johanna Amann; Jethro G. Beekman; Mathias Payer; Nicolas Weaver; David Adrian; Vern Paxson; Michael Bailey; J. Alex Halderman

The Heartbleed vulnerability took the Internet by surprise in April 2014. The vulnerability, one of the most consequential since the advent of the commercial Internet, allowed attackers to remotely read protected memory from an estimated 24--55% of popular HTTPS sites. In this work, we perform a comprehensive, measurement-based analysis of the vulnerabilitys impact, including (1) tracking the vulnerable population, (2) monitoring patching behavior over time, (3) assessing the impact on the HTTPS certificate ecosystem, and (4) exposing real attacks that attempted to exploit the bug. Furthermore, we conduct a large-scale vulnerability notification experiment involving 150,000 hosts and observe a nearly 50% increase in patching by notified hosts. Drawing upon these analyses, we discuss what went well and what went poorly, in an effort to understand how the technical community can respond more effectively to such events in the future.


mobile ad hoc networking and computing | 2015

Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication

Yue Liu; David R. Bild; David Adrian; Gulshan Singh; Robert P. Dick; Dan S. Wallach; Z. Morley Mao

Delay Tolerant Networks (DTNs) composed of commodity mobile devices have the potential to support communication applications resistant to blocking and censorship, as well as certain types of surveillance. We analyze the performance and energy consumption of such a network, and consider the impact of random and targeted denial-of-service and censorship attacks. To gather wireless connectivity traces for a DTN composed of human-carried commodity smartphones, we implemented and deployed a prototype DTN-based micro-blogging application, called 1am, in a college town. We analyzed the system during a time period with 111 users. Although the study provided detailed enough connectivity traces to enable analysis, message posting was too infrequent to draw strong conclusions based on user-initiated messages, alone. We therefore simulated more frequent message initiations and used measured connectivity traces to analyze message propagation. Using a flooding protocol, we found that with an adoption rate of 0.2% of a college towns student and faculty population, the median one-week delivery rate is 85% and the median delivery delay is 13 hours. We also found that the network delivery rate and delay are robust to denial-of service and censorship attacks eliminating more than half of the participants. Using a measurement-based energy model, we also found that the DTN system would use less than 10.0% of a typical smartphones battery energy per day in a network of 2,500 users.


conference on privacy security and trust | 2016

An Internet-wide view of ICS devices

Ariana Mirian; Zane Ma; David Adrian; Matthew Tischer; Thasphon Chuenchujit; Tim Yardley; Robin Berthier; Joshua Mason; Zakir Durumeric; J. Alex Halderman; Michael Bailey

Industrial control systems have become ubiquitous, enabling the remote, electronic control of physical equipment and sensors. Originally designed to operate on closed networks, the protocols used by these devices have no built-in security. However, despite this, an alarming number of systems are connected to the public Internet and an attacker who finds a device often can cause catastrophic damage to physical infrastructure. We consider two aspects of ICS security in this work: (1) what devices have been inadvertently exposed on the public Internet, and (2) who is searching for vulnerable systems. First, we implement five common SCADA protocols in ZMap and conduct a survey of the public IPv4 address space finding more than 60K publicly accessible systems. Second, we use a large network telescope and high-interaction honeypots to find and profile actors searching for devices. We hope that our findings can both motivate and inform future work on securing industrial control systems.


computer and communications security | 2015

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

David Adrian; Karthikeyan Bhargavan; Zakir Durumeric; Pierrick Gaudry; Matthew Green; J. Alex Halderman; Nadia Heninger; Drew Springall; Emmanuel Thomé; Luke Valenta; Benjamin VanderSloot; Eric Wustrow; Santiago Zanella-Béguelin; Paul Zimmermann


computer and communications security | 2015

A Search Engine Backed by Internet-Wide Scanning

Zakir Durumeric; David Adrian; Ariana Mirian; Michael Bailey; J. Alex Halderman


internet measurement conference | 2015

Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security

Zakir Durumeric; David Adrian; Ariana Mirian; James Kasten; Elie Bursztein; Nicolas Lidzborski; Kurt Thomas; Vijay Eranti; Michael Bailey; J. Alex Halderman


usenix security symposium | 2016

DROWN: Breaking TLS using SSLv2

Christoph Paar; David Adrian; Emilia Käsper; J. Alex Halderman; Jens Steube; Juraj Somorovsky; Luke Valenta; Maik Dankel; Nadia Heninger; Nimrod Aviram; Sebastian Schinzel; Shaanan Cohney; Susanne Engels; Viktor Dukhovni; Yuval Shavitt


WOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies | 2014

Zippier ZMap: internet-wide scanning at 10 Gbps

David Adrian; Zakir Durumeric; Gulshan Singh; J. Alex Halderman


ieee symposium on security and privacy | 2018

Tracking Certificate Misissuance in the Wild

Deepak Kumar; Zhengping Wang; Matthew Hyder; Joseph Dickinson; Gabrielle Beck; David Adrian; Joshua Mason; Zakir Durumeric; J. Alex Halderman; Michael Bailey


network and distributed system security symposium | 2017

Measuring small subgroup attacks against Diffie-Hellman.

Luke Valenta; David Adrian; Antonio Sanso; Shaanan Cohney; Joshua Fried; Marcella Hastings; J. Alex Halderman; Nadia Heninger

Collaboration


Dive into the David Adrian's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Luke Valenta

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Nadia Heninger

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shaanan Cohney

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Joshua Mason

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar

Deepak Kumar

Indian Institute of Technology Delhi

View shared research outputs
Researchain Logo
Decentralizing Knowledge