Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet., , and . WWW, page 70-79. ACM / IW3C2, (2021)Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation., , , , , and . SP, page 3296-3313. IEEE, (2023)A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors., , and . IMC, page 162-180. ACM, (2023)How Internet Resources Might Be Helping You Develop Faster but Less Securely., , , , , and . IEEE Security & Privacy, 15 (2): 50-60 (2017)A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs., , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 7 (3): 59:1-59:26 (December 2023)Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models., , , , and . SP, page 1141-1159. IEEE, (2024)Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures.. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26109).Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers., , , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)Not All Asians are the Same: A Disaggregated Approach to Identifying Anti-Asian Racism in Social Media., , , , , , and . WWW, page 2615-2626. ACM, (2024)Hiding Critical Program Components via Ambiguous Translation., , , , , , and . ICSE, page 1120-1132. ACM, (2022)