Author of the publication

Trends and Lessons from Three Years Fighting Malicious Extensions.

, , , , , , and . USENIX Security Symposium, page 579-593. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adapting Social Spam Infrastructure for Political Censorship., , and . LEET, USENIX Association, (2012)Hack for Hire: Exploring the Emerging Market for Account Hijacking., , , , and . WWW, page 1279-1289. ACM, (2019)Trends and Lessons from Three Years Fighting Malicious Extensions., , , , , , and . USENIX Security Symposium, page 579-593. USENIX Association, (2015)Understanding Longitudinal Behaviors of Toxic Accounts on Reddit., , , and . CoRR, (2022)Toward Gender-Equitable Privacy and Security in South Asia., , , , , , , , , and . IEEE Secur. Priv., 17 (4): 71-77 (2019)"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns., , , , , and . USENIX Security Symposium, page 1181-1198. USENIX Association, (2021)"There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future., , , , , , , and . SOUPS, page 579-603. USENIX Association, (2023)Understanding Digital-Safety Experiences of Youth in the U.S., , , , , , and . CHI, page 191:1-191:15. ACM, (2023)The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges., , , , , , , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 143-164. Springer, (2016)Cloak of Visibility: Detecting When Machines Browse a Different Web., , , , , and . IEEE Symposium on Security and Privacy, page 743-758. IEEE Computer Society, (2016)