Publications
Corelight Sensors detect the ChaChi RAT.
Security Boulevard.
(2021). Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium. 3093-3110.
(2021). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019).
(2018).
(2018).
ICSI & The "Bro" Project.
30 Years of Innovation: ICSI 30th Anniversary Celebration.
(2018). A Large-Scale Empirical Study of Security Patches.
USENIX ;login:. 43(1),
(2018). Scanning the Internet for Liveness.
Computer Communication Review. 48(2),
(2018). Toward Continual Measurement of Global Network-Level Censorship.
Security and Privacy. 16(1),
(2018). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018). Automated Analysis of Cybercriminal Markets.
Proceedings of WWW 2017.
(2017). Characterizing the Nature and Dynamics of Tor Exit Blocking..
Proceedings of USENIX Security 2017.
(2017). On the Potential Abuse of IGMP.
ACM Computer Communication Review. 47(1),
(2017). Social Engineering Attacks on Government Opponents: Target Perspectives.
Proceedings on Privacy Enhancing Technologies. 2, 152-164.
(2017). An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of ACM Internet Measurement Conference.
(2016). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Forwarding-Loop Attacks in Content Delivery Networks.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of ACM CCS.
(2016). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2016). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016). Profiling Underground Merchants Based on Network Behavior.
Proceedings of APWG eCrime 2016.
(2016). Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the International World Wide Web Conference.
(2016). SoK: Towards Grounding Censorship Circumvention in Empiricism.
IEEE Symposium on Security and Privacy.
(2016). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016).