D A T A M I N I N G
Blog posts, Publications and Talks
023
Filter by

Targeted Attack Against Corporate Inboxes A Gmail Perspective
Talk - network security - RSA 2017

Picasso: Lightweight Device Class Fingerprinting for Web Clients
Publication - anti-abuse - SPSM 2016

Predicting Hearthstone game outcome with machine learning
Blog post - video game - Oct 2016

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
Publication - anti-abuse - RAID 2016

Remedying web hijacking notification effectiveness and webmaster comprehension
Publication - web security - WWW 2016

The dark side of online poker or the commoditization and weaponization of big data and espionage
Blog post - hacking - Feb 2016

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security
Publication - network security - IMC 2015

Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google
Publication - anti-abuse - WWW 2015

Ad injection at scale: assessing deceptive advertisement modifications
Publication - anti-abuse - S&P 2015

Handcrafted fraud and extortion: manual account hijacking in the wild
Publication - anti-abuse - IMC 2014

I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up
Blog post - video game - Sep 2014

Pricing hearthstone cards with unique abilities: VanCleef and The Twilight Drake
Blog post - video game - Aug 2014

How to find undervalued Hearthstone cards automatically
Blog post - video game - Jul 2014

How to appraise Hearthstone card values
Blog post - video game - Jul 2014

Using big data to understand users' privacy concerns
Blog post - privacy - May 2014

Cloak and swagger: understanding data sensitivity through the lens of user anonymity
Publication - privacy - S&P 2014

Easy does it: more usable captchas
Publication - web security - CHI 2014

Analyzing web application performance
Blog post - web - Mar 2011

Some insights about password shapes
Blog post - security - Feb 2011

Kartograph
Talk - video game - Defcon 2010

How good are humans at solving captchas a large scale evaluation
Publication - web security - S&P 2010

State of the art automated black-box web application vulnerability testing
Publication - web security - S&P 2010

Trackback spam abuse and prevention
Publication - web security - CCSW 2009