Publications
Conference papers
- Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem [PDF] [BibTeX]
- Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem [PDF] [BibTeX]
- Not Your Average App: A Large-scale Privacy Analysis of Android Browsers [PDF] [BibTeX]
- Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem [PDF] [BibTeX]
- Blocklist babel: On the Transparency and Dynamics of Open Source Blocklisting [PDF] [BibTeX]
- Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services [PDF] [BibTeX]
- An Analysis of Pre-installed Android Software [PDF] [BibTeX]
- Don't Accept Candy from Strangers: An Analysis of Third-Party Mobile SDKs [PDF] [BibTeX]
- Tales from the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem [PDF] [BibTeX]
-
A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists
[PDF]
[BibTeX]
- An Analysis of Pre-installed Android Software [PDF] [BibTeX]
- This Is My Private Business! Privacy Risks on Adult Websites [PDF] [BibTeX]
- BGP Table Fragmentation: what & who? [PDF] [BibTeX]
Also published in Data Protection and Privacy, Volume 13: Data Protection and Artificial Intelligence, 2021, Bloomsbury Publishing.
Video presentation from RIPE 74.
Thesis
Conception rules for IGP and iBGP topologies to ensure BGP correctness
[PDF] [slides] [BibTeX]The current Internet routing protocol, the border gateway protocol (BGP), offers a large flexibility of configuration for operators.However, because of this flexibility, anomalies can arise: BGP may fail to converge, some routers may be deprived of connectivity to the outside world, or routing loops can be created. Avoiding or fixing such anomalies can be complicated, especially for large topologies.
In this thesis, we will first review the existing models to capture the behaviour of BGP and introduce a decision problem, the stable path problem (SPP). The SPP model aim to track routing anomalies: by applying this model on a network topology, we can assure whether the given topology will be correct, or if it will be subject to anomalies. We will review the different kinds of anomalies discovered by the research community and classify them.
In the second part, we will give our definition of congruency in the context of BGP topologies, and show that any topology that respects this definition is correct.Then, we will present algorithms to correct a topology by making sure that it respects our definition of congruency.
We will conclude this thesis by giving a brief overview of the other existing approaches to the study of BGP correctness, and study the different perspectives opened by this work.