theme image

measurement

measurement
profile
It's common and a part of being a content creator: Understanding How Creators Experience and Cope with Hate and Harassment Online
user experience

It's common and a part of being a content creator: Understanding How Creators Experience and Cope with Hate and Harassment Online

CHI 2022

Malicious Documents Emerging Trends: A Gmail Perspective
security

Malicious Documents Emerging Trends: A Gmail Perspective

RSA 2020

Insights about the first five years of Right to Be Forgotten requests at Google
web

Insights about the first five years of Right to Be Forgotten requests at Google

Dec 2019

Five years of the Right to Be Forgotten
web

Five years of the Right to Be Forgotten

CCS 2019

Rethinking the detection of child sexual abuse imagery on the Internet
ai

Rethinking the detection of child sexual abuse imagery on the Internet

WWW 2019

Rethinking how to detect child sexual abuse imagery on the Internet
ai

Rethinking how to detect child sexual abuse imagery on the Internet

Enigma 2019

Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data
security

Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data

SOUPS 2018

Quantifying the impact of the Twitter fake accounts purge - a technical analysis
web

Quantifying the impact of the Twitter fake accounts purge - a technical analysis

Aug 2018

Taking down Gooligan part 3 — monetization and clean-up
network security

Taking down Gooligan part 3 — monetization and clean-up

Mar 2018

Taking down Gooligan: part 2 — inner workings
network security

Taking down Gooligan: part 2 — inner workings

Mar 2018

Taking down Gooligan: part 1 — overview
network security

Taking down Gooligan: part 1 — overview

Mar 2018

Hunting down Gooligan — retrospective analysis
network security

Hunting down Gooligan — retrospective analysis

Botconf 2017

Tracking desktop ransomware payments end to end
security

Tracking desktop ransomware payments end to end

S&P 2018

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis
cybersecurity

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Dec 2017

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
anti-abuse

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

CCS 2017

Unmasking the ransomware kingpins
security

Unmasking the ransomware kingpins

Oct 2017

Exposing the inner-workings of the ransomware economy
security

Exposing the inner-workings of the ransomware economy

Sep 2017

How to trace ransomware payments end-to-end - an overview
security

How to trace ransomware payments end-to-end - an overview

Aug 2017

Understanding the Mirai Botnet
network security

Understanding the Mirai Botnet

Usenix Security 2017

Tracking ransomware payments end to end
security

Tracking ransomware payments end to end

BH USA 2017

Pinning Down Abuse on Google Maps
anti-abuse

Pinning Down Abuse on Google Maps

WWW 2017

Understanding the prevalence of web traffic interception
web security

Understanding the prevalence of web traffic interception

Jun 2017

The Security Impact of HTTPS Interception
web security

The Security Impact of HTTPS Interception

NDSS 2017

Targeted Attack Against Corporate Inboxes A Gmail Perspective
security

Targeted Attack Against Corporate Inboxes A Gmail Perspective

RSA 2017

Picasso: Lightweight Device Class Fingerprinting for Web Clients
anti-abuse

Picasso: Lightweight Device Class Fingerprinting for Web Clients

SPSM 2016

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
anti-abuse

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

RAID 2016

Investigating commercial pay-per-install and the distribution of unwanted software
anti-abuse

Investigating commercial pay-per-install and the distribution of unwanted software

Usenix Security 2016

Does dropping usb drives really work?
hacking

Does dropping usb drives really work?

Black Hat 2016

How google helps 600,000 webmasters re-secure their hacked sites every year
web security

How google helps 600,000 webmasters re-secure their hacked sites every year

Jun 2016

Cloak of visibility: detecting when machines browse a different web
anti-abuse

Cloak of visibility: detecting when machines browse a different web

S&P 2016

Remedying web hijacking notification effectiveness and webmaster comprehension
web security

Remedying web hijacking notification effectiveness and webmaster comprehension

WWW 2016

Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots
hacking

Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots

Apr 2016

Users really do plug in usb drives they find
security

Users really do plug in usb drives they find

S&P 2016

How an improved responsive design and faster site increased visitor engagement by 104%
web

How an improved responsive design and faster site increased visitor engagement by 104%

Mar 2016

How email in transit can be intercepted using dns hijacking
network security

How email in transit can be intercepted using dns hijacking

Jan 2016

Understanding how tls downgrade attacks prevent email encryption
network security

Understanding how tls downgrade attacks prevent email encryption

Dec 2015

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security
network security

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security

IMC 2015

Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google
anti-abuse

Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google

WWW 2015

Ad injection at scale: assessing deceptive advertisement modifications
anti-abuse

Ad injection at scale: assessing deceptive advertisement modifications

S&P 2015

19.5% of https sites trigger browser warning as they use sha-1 signed certificates
web security

19.5% of https sites trigger browser warning as they use sha-1 signed certificates

Jan 2015

Handcrafted fraud and extortion: manual account hijacking in the wild
anti-abuse

Handcrafted fraud and extortion: manual account hijacking in the wild

IMC 2014

Dialing back abuse on phone verified accounts
anti-abuse

Dialing back abuse on phone verified accounts

CCS 2014

The end is nigh: generic solving of text-based captchas
web security

The end is nigh: generic solving of text-based captchas

WOOT 2014

Using big data to understand users' privacy concerns
privacy

Using big data to understand users' privacy concerns

May 2014

Cloak and swagger: understanding data sensitivity through the lens of user anonymity
privacy

Cloak and swagger: understanding data sensitivity through the lens of user anonymity

S&P 2014

Meaning matters: why google switched to numeric captchas
user experience

Meaning matters: why google switched to numeric captchas

Apr 2014

Online microsurveys for user experience research
user experience

Online microsurveys for user experience research

CHI 2014

High-end macbook pro retina (late 2013, 15in) benchmark
web

High-end macbook pro retina (late 2013, 15in) benchmark

Oct 2013

The (untold) price of doing local search
web

The (untold) price of doing local search

Sep 2013

When a porn site masquerades as the apple app store
anti-abuse

When a porn site masquerades as the apple app store

May 2013

Porn domain not that sexy: no rush to have .xxx
web

Porn domain not that sexy: no rush to have .xxx

Dec 2011

What phishing sites look like ? (study)
anti-abuse

What phishing sites look like ? (study)

Nov 2011

Text-based captcha strengths and weaknesses
web security

Text-based captcha strengths and weaknesses

CCS 2011

Reclaiming the blogosphere talkback a secure linkback protocol for weblogs
web security

Reclaiming the blogosphere talkback a secure linkback protocol for weblogs

ESORICS 2011

The failure of noise-based non-continuous audio captchas
web security

The failure of noise-based non-continuous audio captchas

S&P 2011

Some insights about password shapes
security

Some insights about password shapes

Feb 2011

Kamouflage loss-resistant password management
security

Kamouflage loss-resistant password management

ESORICS 2010

An analysis of private browsing modes in modern browsers
privacy

An analysis of private browsing modes in modern browsers

Usenix Security 2010

Webseclab security education workbench
web security

Webseclab security education workbench

CEST 2010

Busting frame busting a study of clickjacking vulnerabilities on popular sites
web security

Busting frame busting a study of clickjacking vulnerabilities on popular sites

W2SP 2010

How good are humans at solving captchas a large scale evaluation
web security

How good are humans at solving captchas a large scale evaluation

S&P 2010

State of the art automated black-box web application vulnerability testing
web security

State of the art automated black-box web application vulnerability testing

S&P 2010

Trackback spam abuse and prevention
web security

Trackback spam abuse and prevention

CCSW 2009

Embedded management interfaces emerging massive insecurity
hacking

Embedded management interfaces emerging massive insecurity

Black Hat 2009

Probabilistic protocol identification for hard to classify protocol
network security

Probabilistic protocol identification for hard to classify protocol

WISTP 2008

Time has something to tell us about network address translation
network security

Time has something to tell us about network address translation

NordSec 2007

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.