Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Masquerade: Simulating a Thousand Victims., , , and . login Usenix Mag., (2008)To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads., , , , and . USENIX Security Symposium, page 171-184. USENIX Association, (2008)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)Skill Squatting Attacks on Amazon Alexa., , , , , , and . USENIX Security Symposium, page 33-47. USENIX Association, (2018)What's in a Name? Exploring CA Certificate Control., , , , and . USENIX Security Symposium, page 4383-4400. USENIX Association, (2021)The Impact of Secure Transport Protocols on Phishing Efficacy., , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves., , , , and . AsiaCCS, page 73-85. ACM, (2019)English shellcode., , , and . ACM Conference on Computer and Communications Security, page 524-533. ACM, (2009)Emerging Threats in Internet of Things Voice Services., , , , , , and . IEEE Secur. Priv., 17 (4): 18-24 (2019)Jetset: Targeted Firmware Rehosting for Embedded Systems., , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2021)