Theme Selector
Filter by
No Results Found, Please Adjust Your Search
DROIDCCT: Cryptographic Compliance Test via Trillion-Scale Measurement
ACSAC 2025
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
CHES 2024
Leveraging Virtual Reality to Enhance Diversity and Inclusion training at Google
CHI 2024
RETSim: Resilient and Efficient Text Similarity
ICLR 2024
RETVec: Resilient and Efficient Text Vectorizer
NeurIPS 2023
Hybrid Post-Quantum Signatures in Hardware Security Keys
ACNS 2023
It's common and a part of being a content creator: Understanding How Creators Experience and Cope with Hate and Harassment Online
CHI 2022
Designing Toxic Content Classification for a Diversity of Perspectives
SOUPS 2021
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
S&P 2021
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
IMC 2020
Why wouldn't someone think of democracy as a target? Security practices & challenges of people involved with U.S. political campaigns"
Usenix Security 2021
Spotlight: Malware Lead Generation At Scale
ACSAC 2020
Five years of the Right to Be Forgotten
CCS 2019
Protecting accounts from credential stuffing with password breach alerting
Usenix Security 2019
Rethinking the detection of child sexual abuse imagery on the Internet
WWW 2019
They Don't Leave Us Alone Anywhere We Go - Gender and Digital Abuse in South Asia
CHI 2019
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data
SOUPS 2018
Tracking desktop ransomware payments end to end
S&P 2018
Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
CCS 2017
The first collision for full SHA-1
Crypto 2017
Understanding the Mirai Botnet
Usenix Security 2017
Pinning Down Abuse on Google Maps
WWW 2017
The Security Impact of HTTPS Interception
NDSS 2017
Picasso: Lightweight Device Class Fingerprinting for Web Clients
SPSM 2016
I am a legend hacking hearthstone using statistical learning methods
CIG 2016
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
RAID 2016
Investigating commercial pay-per-install and the distribution of unwanted software
Usenix Security 2016
Cloak of visibility: detecting when machines browse a different web
S&P 2016
Remedying web hijacking notification effectiveness and webmaster comprehension
WWW 2016
Users really do plug in usb drives they find
S&P 2016
Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security
IMC 2015
Framing dependencies introduced by underground commoditization
WEIS 2015
Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google
WWW 2015
Ad injection at scale: assessing deceptive advertisement modifications
S&P 2015
Handcrafted fraud and extortion: manual account hijacking in the wild
IMC 2014
Dialing back abuse on phone verified accounts
CCS 2014
The end is nigh: generic solving of text-based captchas
WOOT 2014
Cloak and swagger: understanding data sensitivity through the lens of user anonymity
S&P 2014
Easy does it: more usable captchas
CHI 2014
Online microsurveys for user experience research
CHI 2014
Sessionjuggler secure web login from an untrusted terminal using session hijacking
WWW 2012
Text-based captcha strengths and weaknesses
CCS 2011
Reclaiming the blogosphere talkback a secure linkback protocol for weblogs
ESORICS 2011
Towards secure embedded web interfaces
Usenix Security 2011
Openconflict preventing real time map hacks in online games
S&P 2011
The failure of noise-based non-continuous audio captchas
S&P 2011
Kamouflage loss-resistant password management
ESORICS 2010
An analysis of private browsing modes in modern browsers
Usenix Security 2010
Framing attacks on smartphones and dumb routers: social sites tap-jacking and geo-localization attacks
WOOT 2010
Recovering windows secrets and efs certificates offline
WOOT 2010
Webseclab security education workbench
CEST 2010
The emergence of cross channel scripting
CACM 2010
Busting frame busting a study of clickjacking vulnerabilities on popular sites
W2SP 2010
How good are humans at solving captchas a large scale evaluation
S&P 2010
State of the art automated black-box web application vulnerability testing
S&P 2010
Using strategy objectives for network security analysis
Inscrypt 2009
Trackback spam abuse and prevention
CCSW 2009
Xcs cross channel scripting and its impact on web applications
CCS 2009
Decaptcha breaking 75% of ebay audio captchas
WOOT 2009
Extending anticipation games with location penalty and timeline
FAST 2008
Netqi a model checker for anticipation game
ATVA 2008
Probabilistic protocol identification for hard to classify protocol
WISTP 2008
A logical framework for evaluating network resilience against faults and attacks
ASIAN 2007
Time has something to tell us about network address translation
NordSec 2007