Theme Selector
Filter by
No Results Found, Please Adjust Your Search
It's common and a part of being a content creator: Understanding How Creators Experience and Cope with Hate and Harassment Online
CHI 2022
Malicious Documents Emerging Trends: A Gmail Perspective
RSA 2020
Insights about the first five years of Right to Be Forgotten requests at Google
Dec 2019
Five years of the Right to Be Forgotten
CCS 2019
Rethinking the detection of child sexual abuse imagery on the Internet
WWW 2019
Rethinking how to detect child sexual abuse imagery on the Internet
Enigma 2019
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data
SOUPS 2018
Quantifying the impact of the Twitter fake accounts purge - a technical analysis
Aug 2018
Taking down Gooligan part 3 — monetization and clean-up
Mar 2018
Taking down Gooligan: part 2 — inner workings
Mar 2018
Taking down Gooligan: part 1 — overview
Mar 2018
Hunting down Gooligan — retrospective analysis
Botconf 2017
Tracking desktop ransomware payments end to end
S&P 2018
Inside Mirai the infamous IoT Botnet: A Retrospective Analysis
Dec 2017
Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
CCS 2017
Unmasking the ransomware kingpins
Oct 2017
Exposing the inner-workings of the ransomware economy
Sep 2017
How to trace ransomware payments end-to-end - an overview
Aug 2017
Understanding the Mirai Botnet
Usenix Security 2017
Tracking ransomware payments end to end
BH USA 2017
Pinning Down Abuse on Google Maps
WWW 2017
Understanding the prevalence of web traffic interception
Jun 2017
The Security Impact of HTTPS Interception
NDSS 2017
Targeted Attack Against Corporate Inboxes A Gmail Perspective
RSA 2017
Picasso: Lightweight Device Class Fingerprinting for Web Clients
SPSM 2016
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
RAID 2016
Investigating commercial pay-per-install and the distribution of unwanted software
Usenix Security 2016
Does dropping usb drives really work?
Black Hat 2016
How google helps 600,000 webmasters re-secure their hacked sites every year
Jun 2016
Cloak of visibility: detecting when machines browse a different web
S&P 2016
Remedying web hijacking notification effectiveness and webmaster comprehension
WWW 2016
Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots
Apr 2016
Users really do plug in usb drives they find
S&P 2016
How an improved responsive design and faster site increased visitor engagement by 104%
Mar 2016
How email in transit can be intercepted using dns hijacking
Jan 2016
Understanding how tls downgrade attacks prevent email encryption
Dec 2015
Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security
IMC 2015
Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google
WWW 2015
Ad injection at scale: assessing deceptive advertisement modifications
S&P 2015
19.5% of https sites trigger browser warning as they use sha-1 signed certificates
Jan 2015
Handcrafted fraud and extortion: manual account hijacking in the wild
IMC 2014
Dialing back abuse on phone verified accounts
CCS 2014
The end is nigh: generic solving of text-based captchas
WOOT 2014
Using big data to understand users' privacy concerns
May 2014
Cloak and swagger: understanding data sensitivity through the lens of user anonymity
S&P 2014
Meaning matters: why google switched to numeric captchas
Apr 2014
Online microsurveys for user experience research
CHI 2014
High-end macbook pro retina (late 2013, 15in) benchmark
Oct 2013
The (untold) price of doing local search
Sep 2013
When a porn site masquerades as the apple app store
May 2013
Porn domain not that sexy: no rush to have .xxx
Dec 2011
What phishing sites look like ? (study)
Nov 2011
Text-based captcha strengths and weaknesses
CCS 2011
Reclaiming the blogosphere talkback a secure linkback protocol for weblogs
ESORICS 2011
The failure of noise-based non-continuous audio captchas
S&P 2011
Some insights about password shapes
Feb 2011
Kamouflage loss-resistant password management
ESORICS 2010
An analysis of private browsing modes in modern browsers
Usenix Security 2010
Webseclab security education workbench
CEST 2010
Busting frame busting a study of clickjacking vulnerabilities on popular sites
W2SP 2010
How good are humans at solving captchas a large scale evaluation
S&P 2010
State of the art automated black-box web application vulnerability testing
S&P 2010
Trackback spam abuse and prevention
CCSW 2009
Embedded management interfaces emerging massive insecurity
Black Hat 2009
Probabilistic protocol identification for hard to classify protocol
WISTP 2008
Time has something to tell us about network address translation
NordSec 2007