MADWeb 2025 Program


Best paper award sponsored by Palo Alto Networks
Can Public IP Blocklists Explain Internet Radiation?
Damiano Ravalico, Simone Cossaro (University of Trieste), Rodolfo Valentim (University of Turin), Martino Trevisan (University of Trieste), and Idilio Drago (University of Turin)

  Friday February 28, 2025 Times in PT (UTC-8)
8:00 - 12:00 Registration
8:00 - 9:00 Breakfast
9:00 - 9:05 Welcome and Opening Remarks
9:05 - 10:05

Abstract: In this talk, we take a step back and argue that many varied and seemingly unrelated attacks on the web are actually symptoms of one deeper problem that has existed since the web's inception. Whether it is attacks due to expired domain names, cloaking done by malicious websites, malvertising, or even our growing distrust of the news can be largely attributed back to the issue of stateless linking. Stateless linking refers to the absence of any integrity guarantees between the time that a link for a remote resource was created, to a future time when this link is resolved by web clients. We draw on 10+ years of research to demonstrate how stateless linking and the resulting lack of content integrity is the true culprit for many of our past, current, and likely future web problems. Successfully tackling this one really challenging problem, has the potential of solving many of our web woes.

Short Bio: Nick Nikiforakis (PhD'13) is an Associate Professor in the Department of Computer Science at Stony Brook University. He leads the PragSec Lab, where his students conduct research in cyber security, with a focus on web and network security. He is the author of more than 90 peer-reviewed academic publications and his work is often discussed in the popular press. He is the recipient of the National Science Foundation CAREER award (2020), the Office of Naval Research Young Investigator Award (2020), as well as a range of other security-related and privacy-related awards by federal funding agencies. Next to multiple best-paper awards, the National Security Agency awarded him the "Best Scientific Cybersecurity Paper" award for his research on certificate transparency abuse in 2023.

10:05 - 10:20 Morning Break
10:20 - 12:00 Session 1: Network Meets the Web

Session chair: Zhenkai Liang, NUS

  SNITCH: Leveraging IP Geolocation for Active VPN Detection
Tomer Schwartz, Andikan Otung, and Ofir Manor (Fujitsu Research of Europe)
  Can Public IP Blocklists Explain Internet Radiation?
Damiano Ravalico, Simone Cossaro (University of Trieste), Rodolfo Valentim (University of Turin), Martino Trevisan (University of Trieste), and Idilio Drago (University of Turin)
  The State of https Adoption on the Web
Christoph Kerschbaumer, Frederik Braun, Simon Friedberger, and Malte Jürgens (Mozilla Corporation)
  Security Signals: Making Web Security Posture Measurable At Scale
Michele Spagnuolo, David Dworken, Artur Janc, Santiago Díaz, and Lukas Weichselbaum (Google)
12:00 - 13:30 Lunch
13:30 - 15:10 Session 2: Authentication and Browser Security

Session chair: Jianjia Yu (Johns Hopkins University)

  Five Word Password Composition Policy
Sirvan Almasi and William J. Knottenbelt (Imperial College London)
  Evaluating the Strength and Availability of Multilingual Passphrase Authentication
Chi-en Tai, Urs Hengartner, and Alexander Wong (University of Waterloo)
  BrowserFM: A Feature Model-based Approach to Browser Fingerprint Analysis
Maxime Huyghe (University of Lille), Walter Rudametkin (IRISA / Inria / Univ. Rennes / IUF), and Clément Quinton (University of Lille)
  Towards Anonymous Chatbots with (Un)Trustworthy Browser Proxies
Dzung Pham, Jade Sheffey, Chau Minh Pham, and Amir Houmansadr (University of Massachusetts Amherst)
15:10 - 15:40 Afternoon Break
15:40 - 16:40

In this talk, we will examine web security through the browser's perspective. Various browser features have helped fix transport security issues and increase HTTPS adoption: Encouragements in the form of providing more exciting APIs exclusively to Secure Context or deprecating features (like with Mixed Content Blocking) have brought HTTPS adoption to over 90% in ten years.
With these successful interventions as the browser's carrots and sticks - rewards for secure practices and penalties for insecure ones - we will then identify what academia and the industry can do to further apply security improvements. In particular, we will look at highly prevalent security issues in client code, like XSS and CSRF. In the end, we will see how the browser can play an instrumental role in web security improvements and what common tactics and potential issues exist.


Short Bio: Frederik Braun builds security for the web and Mozilla Firefox in Berlin. As a contributor to standards, Frederik is also improving the web platform by bringing security into the defaults with specifications like the Sanitizer API and Subresource Integrity. Before Mozilla, Frederik studied IT-Security at the Ruhr-University in Bochum where he taught web security and co-founded the CTF team fluxfingers.

16:40 - 17:50 Session 3: Web3 and Work in Progress

Session chair: Christoph Kerschbaumer (Mozilla)

  DeFiIntel: A Dataset Bridging On-Chain and Off-Chain Data for DeFi Token Scam Investigation
Iori Suzuki, Yin Minn Pa Pa, Nguyen Anh Thi Van, and Katsunari Yoshioka (Yokohama National University)
  Work-in-Progress: Detecting Browser-in-the-Browser Attacks from Their Behaviors and DOM Structures
Ryusei Ishikawa, Soramichi Akiyama, and Tetsutaro Uehara (Ritsumeikan University)
  Work-in-Progress: Towards Browser-Based Consent Management
Gayatri Priyadarsini Kancherla and Abhishek Bichhawat (Indian Institute of Technology Gandhinagar)
  Work-in-Progress: Uncovering Dark Patterns: A Longitudinal Study of Cookie Banner Practices under GDPR (2017-2024)
Zihan Qu (Johns Hopkins University), Xinyi Qu (University College London), Xin Shen, Zhen Liang, and Jianjia Yu (Johns Hopkins University)
17:50 - 18:00 Awards and Closing Remarks

madwebwork.bsky.social
infosec.exchange/@madwebwork
@madwebwork

MADWeb 2026, in cooperation with the NDSS Symposium