Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In the Line of Fire: Risks of DPI-triggered Data Collection., , , , , , , , and . CSET @ USENIX Security Symposium, page 57-63. ACM, (2023)Locked-in during lock-down: undergraduate life on the internet in a pandemic., , and . Internet Measurement Conference, page 480-486. ACM, (2021)An Empirical Analysis of Enterprise-Wide Mandatory Password Updates., , , and . ACSAC, page 150-162. ACM, (2023)Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy., , , , , , and . EuroS&P, page 373-391. IEEE, (2023)Measuring Security Practices and How They Impact Security., , , , , , , , and . Internet Measurement Conference, page 36-49. ACM, (2019)Web feature deprecation: a case study for chrome., , , , , and . ICSE (SEIP), page 302-311. IEEE / ACM, (2019)A Search Engine Backed by Internet-Wide Scanning., , , , and . CCS, page 542-553. ACM, (2015)Hack for Hire: Exploring the Emerging Market for Account Hijacking., , , , and . WWW, page 1279-1289. ACM, (2019)Measuring security practices., , , , , , , , and . Commun. ACM, 65 (9): 93-102 (2022)CoResident Evil: Covert Communication In The Cloud With Lambdas., , , , and . WWW, page 1005-1016. ACM / IW3C2, (2021)