Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Milivoj Simeonovski is active.

Publication


Featured researches published by Milivoj Simeonovski.


international world wide web conferences | 2017

Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals

Milivoj Simeonovski; Giancarlo Pellegrino; Christian Rossow; Michael Backes

The Internet is built on top of intertwined network services, e.g., email, DNS, and content distribution networks operated by private or governmental organizations. Recent events have shown that these organizations may, knowingly or unknowingly, be part of global-scale security incidents including state-sponsored mass surveillance programs and large-scale DDoS attacks. For example, in March 2015 the Great Cannon attack has shown that an Internet service provider can weaponize millions of Web browsers and turn them into DDoS bots by injecting malicious JavaScript code into transiting TCP connections. While attack techniques and root cause vulnerabilities are routinely studied, we still lack models and algorithms to study the intricate dependencies between services and providers, reason on their abuse, and assess the attack impact. To close this gap, we present a technique that models services, providers, and dependencies as a property graph. Moreover, we present a taint-style propagation-based technique to query the model, and present an evaluation of our framework on the top 100k Alexa domains.


applied cryptography and network security | 2014

BackRef: Accountability in Anonymous Communication Networks

Michael Backes; Jeremy Clark; Aniket Kate; Milivoj Simeonovski; Peter Druschel

Many anonymous communication networks (ACNs) rely on routing traffic through a sequence of proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes may become embroiled in a criminal investigation if originators commit criminal actions through the ACN. We present BackRef, a generic mechanism for ACNs that provides practical repudiation for the proxy nodes by tracing back the selected outbound traffic to the predecessor node (but not in the forward direction) through a cryptographically verifiable chain. It also provides an option for full (or partial) traceability back to the entry node or even to the corresponding originator when all intermediate nodes are cooperating. Moreover, to maintain a good balance between anonymity and accountability, the protocol incorporates whitelist directories at exit proxy nodes. BackRef offers improved deployability over the related work, and introduces a novel concept of pseudonymous signatures that may be of independent interest.


recent advances in intrusion detection | 2016

On the Feasibility of TTL-Based Filtering for DRDoS Mitigation

Michael Backes; Thorsten Holz; Christian Rossow; Teemu Rytilahti; Milivoj Simeonovski; Ben Stock

A major disturbance for network providers in recent years have been Distributed Reflective Denial-of-Service (DRDoS) attacks. In such an attack, the adversary spoofs the IP address of a victim and sends a flood of tiny packets to vulnerable services. The services then respond to spoofed the IP, flooding the victim with large replies. Led by the idea that an attacker cannot fabricate the number of hops a packet travels between amplifier and victim, Hop Count Filtering (HCF) mechanisms that analyze the Time-to-Live (TTL) of incoming packets have been proposed as a solution.


ACM Computing Surveys | 2018

A Survey on Routing in Anonymous Communication Protocols

Fatemeh Shirazi; Milivoj Simeonovski; Muhammad Rizwan Asghar; Michael Backes; Claudia Diaz

The Internet has undergone dramatic changes in the past 2 decades and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation has brought tremendous benefits to society, it has also created new threats to online privacy, such as omnipotent governmental surveillance. As a result, public interest in systems for anonymous communication has drastically increased. In this work, we survey previous research on designing, developing, and deploying systems for anonymous communication. Our taxonomy and comparative assessment provide important insights about the differences between the existing classes of anonymous communication protocols.


applied cryptography and network security | 2015

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

Milivoj Simeonovski; Fabian Bendun; Muhammad Rizwan Asghar; Michael Backes; Ninja Marnau; Peter Druschel

Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information — either intentionally released by the person herself, or unintentionally leaked or published by third parties without being noticed, often with detrimental effects on the individual’s privacy. To grant individuals the ability to regain control over their disseminated personal information, the European Court of Justice recently ruled that EU citizens have a right to be forgotten in the sense that indexing systems, such as Google, must offer them technical means to request removal of links from search results that point to sources violating their data protection rights. As of now, these technical means consist of a web form that requires a user to manually identify all relevant links herself upfront and to insert them into the web form, followed by a manual evaluation by employees of the indexing system to assess if the request to remove those links is eligible and lawful.


computer and communications security | 2014

POSTER: Quasi-ID: In fact, I am a human

Milivoj Simeonovski

CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are the dominantly used turing tests to protect websites against bots that are impersonating human users to gain access to various types of services. The test is designed in a way to be very difficult for robotic programs, but comfortably easy for humans. As artificial intelligence research thrives towards the biggest challenge of the field - simulating the work of a human brain - the complexity of CAPTCHA tests increases, making it more and more difficult for humans to answer the tests. The problem gets even bigger, with the latest research reports in fact indicating that CAPTCHAs are broken. We present Quasi-ID: a novel approach for determining whether or not a user is a human in a scalable and privacy-preserving manner. Our system utilizes smart devices as ubiquitous input devices for invoking a physical interaction with the users. Such an interaction between the user and his smart device can prove that the user is actually a human. Support for Quasi-ID can be deployed today along with the current CAPTCHA solutions. It does not add additional burden to the web service and requires a non-persistent communication with the Quasi-ID service provider.


arXiv: Cryptography and Security | 2013

Introducing Accountability to Anonymity Networks

Michael Backes; Jeremy Clark; Peter Druschel; Aniket Kate; Milivoj Simeonovski


international conference on communications | 2018

PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale

Muhammad Rizwan Asghar; Michael Backes; Milivoj Simeonovski


ieee european symposium on security and privacy | 2018

Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure

Patrick Speicher; Marcel Steinmetz; Robert Künnemann; Milivoj Simeonovski; Giancarlo Pellegrino; Jörg Hoffmann; Michael Backes


Archive | 2018

Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version)

Patrick Speicher; Marcel Steinmetz; Robert Künnemann; Milivoj Simeonovski; Giancarlo Pellegrino; Jörg Hoffmann; Michael Backes

Collaboration


Dive into the Milivoj Simeonovski's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge