Author of the publication

SoK: Security Evaluation of Home-Based IoT Deployments.

, , , and . IEEE Symposium on Security and Privacy, page 1362-1380. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers., , , , , , and . CoRR, (2017)Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries., , , , and . ACM Conference on Computer and Communications Security, page 211-222. ACM, (2008)Measuring and Detecting Malware Downloads in Live Network Traffic., , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 556-573. Springer, (2013)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE Computer Society, (2016)Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet., , , , , and . Comput. Secur., (2017)Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators., , , , , , , and . USENIX Security Symposium, page 5307-5324. USENIX Association, (2023)Returning to Port: Efficient Detection of Home Router Devices., , and . CNS, page 172-180. IEEE, (2022)Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys., , , , , , , and . IMC, page 222-235. ACM, (2023)Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild., , , , , , , , and . WWW, page 840-852. ACM, (2019)An Inside Look into the Practice of Malware Analysis., , , , , and . CCS, page 3053-3069. ACM, (2021)