Author of the publication

Cloak of Visibility: Detecting When Machines Browse a Different Web.

, , , , , and . IEEE Symposium on Security and Privacy, page 743-758. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hack for Hire: Exploring the Emerging Market for Account Hijacking., , , , and . WWW, page 1279-1289. ACM, (2019)Adapting Social Spam Infrastructure for Political Censorship., , and . LEET, USENIX Association, (2012)Suspended accounts in retrospect: an analysis of twitter spam., , , and . Internet Measurement Conference, page 243-258. ACM, (2011)Cloak of Visibility: Detecting When Machines Browse a Different Web., , , , , and . IEEE Symposium on Security and Privacy, page 743-758. IEEE Computer Society, (2016)The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges., , , , , , , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 143-164. Springer, (2016)Trends and Lessons from Three Years Fighting Malicious Extensions., , , , , , and . USENIX Security Symposium, page 579-593. USENIX Association, (2015)Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security., , , , , , , , , and . Internet Measurement Conference, page 27-39. ACM, (2015)Understanding the Mirai Botnet., , , , , , , , , and 9 other author(s). USENIX Security Symposium, page 1093-1110. USENIX Association, (2017)Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension., , , , , , , and . WWW, page 1009-1019. ACM, (2016)Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale., , , , , , , , and . USENIX Security Symposium, page 361-377. USENIX Association, (2020)