Title |
Conference |
Tags |
Composition Kills: A Case Study of Email Sender Authentication |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
Global Measurement of DNS Manipulation |
usenixsecurity-2017 - vancouver,canada |
|
Characterizing the Nature and Dynamics of Tor Exit Blocking |
usenixsecurity-2017 - vancouver,canada |
|
Detecting Credential Spearphishing in Enterprise Settings |
usenixsecurity-2017 - vancouver,canada |
|
The Security Impact of HTTPS Interception |
NDSS-2017 - california,usa |
|
You've Got Vulnerability: Exploring Effective Vulnerability Notifications |
USENIX-2016 - austin,usa |
|
Profiling Underground Merchants Based on Network Behavior |
ecrime-2016 - toronto,canada |
|
VAST: A Unified Platform for Interactive Network Forensics |
NSDI-2016 - santa clara,usa |
|
Forwarding-Loop Attacks in Content Delivery Networks |
NDSS-2016 - california,usa |
|
Do You See What I See? Differential Treatment of Anonymous Users |
NDSS-2016 - california,usa |
|
An Analysis of China’s “Great Cannon” |
FOCI-2015 - washington,USA |
|
Characterizing Large-Scale Click Fraud in ZeroAccess |
CCS-2014 - Scottsdale,USA |
|
Consequences of Connectivity: Characterizing Account Hijacking on Twitter |
CCS-2014 - Scottsdale,USA |
|
When Governments Hack Opponents: A Look at Actors and Technology |
usenix-2014 - san diego,usa |
|
Hulk: Eliciting Malicious Behavior in Browser Extensions |
usenix-2014 - san diego,usa |
|
Welcome and Works-in-Progress |
FOCI-2014 - san diego,usa |
|
Practical Comprehensive Bounds on Surreptitious Communication over DNS |
USENIX-2013 - Washington, D.C. |
|
Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse |
USENIX-2013 - Washington, D.C. |
|
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion |
FOCI-2013 - New Jersey, Washington |
|
An Assessment of Overt Malicious Activity Manifest in Residential Network |
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece |
|
What's Clicking What? Techniques and Innovations of Today's Clickbots |
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece |
|
Adapting Social Spam Infrastructure for Political Censorship |
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA |
Socialbots
Big Data
|
Hold-On: Protecting Against DNS Packet Injection |
Satin-2012 - UK |
|
An Assessment of Overt Malicious Activity Manifest in Residential Network |
dimva-2011 - Amsterdam,Netherkands |
|
What's Clicking What? Techniques and Innovations of Today's Clickbots |
dimva-2011 - Amsterdam,Netherkands |
|
Insights From The Inside: A View Of Botnet Management From Infiltration |
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA |
Security
|
On The Potential Of Proactive Domain Blacklisting |
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA |
Security
|
How The Pursuit Of Truth Led Me To Selling Viagra |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
|
Spamcraft: An Inside Look At Spam Campaign Orchestration |
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA |
Security
|
Principles For Developing Comprehensive Network Visibility |
3rd USENIX Workshop on Hot Topics in Security-2008 - San Jose, USA |
Security
|
On The Spam Campaign Trail |
1st USENIX Workshop on Large-Scale Exploits and Emergent Threats-2008 - San Francisco, USA |
Security
|
The Strengths Of Weaker Identities: Opportunistic Personas |
2nd USENIX Workshop on Hot Topics in Security-2007 - Boston, USA |
Security
|
Dynamic Application-Layer Protocol Analysis For Network Intrusion Detection |
15th USENIX Security Symposium-2006 - Vancouver, Canada |
Security
Analysis
|
Robust Tcp Stream Reassembly In The Presence Of Adversaries |
14th USENIX Security Symposium-2005 - Baltimore, USA |
Security
|
Very Fast Containment Of Scanning Worms |
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
|
How To Own The Internet In Your Spare Time |
11th USENIX Security Symposium-2002 - San Francisco, USA |
Security
|
Network Intrusion Detection: Evasion, Traffic Normalization, And End-To-End Protocol Semantics |
10th USENIX Security Symposium-2001 - Washington DC, USA |
Security
|
Detecting Backdoors |
9th USENIX Security Symposium-2000 - Denver, USA |
Security
|
Detecting Stepping Stones |
9th USENIX Security Symposium-2000 - Denver, USA |
Security
|