Author of the publication

What's in a Name? Exploring CA Certificate Control.

, , , , and . USENIX Security Symposium, page 4383-4400. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads., , , , and . USENIX Security Symposium, page 171-184. USENIX Association, (2008)Masquerade: Simulating a Thousand Victims., , , and . login Usenix Mag., (2008)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)Emerging Threats in Internet of Things Voice Services., , , , , , and . IEEE Secur. Priv., 17 (4): 18-24 (2019)English shellcode., , , and . ACM Conference on Computer and Communications Security, page 524-533. ACM, (2009)The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves., , , , and . AsiaCCS, page 73-85. ACM, (2019)Measuring Identity Confusion with Uniform Resource Locators., , , , , , , , and . CHI, page 1-12. ACM, (2020)Jetset: Targeted Firmware Rehosting for Embedded Systems., , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2021)Empirical Measurement of Systemic 2FA Usability., , , , , , and . USENIX Security Symposium, page 127-143. USENIX Association, (2020)Multi-stage replay with crosscut., , , , , , , and . VEE, page 13-24. ACM, (2010)