Publications
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of ACM CCS.
(2016). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2016). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016). Profiling Underground Merchants Based on Network Behavior.
Proceedings of APWG eCrime 2016.
(2016). Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the International World Wide Web Conference.
(2016). SoK: Towards Grounding Censorship Circumvention in Empiricism.
IEEE Symposium on Security and Privacy.
(2016). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016). VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016). Automated Analysis of Cybercriminal Markets.
Proceedings of WWW 2017.
(2017). Characterizing the Nature and Dynamics of Tor Exit Blocking..
Proceedings of USENIX Security 2017.
(2017). On the Potential Abuse of IGMP.
ACM Computer Communication Review. 47(1),
(2017). Social Engineering Attacks on Government Opponents: Target Perspectives.
Proceedings on Privacy Enhancing Technologies. 2, 152-164.
(2017).
(2018).
(2018).
ICSI & The "Bro" Project.
30 Years of Innovation: ICSI 30th Anniversary Celebration.
(2018). A Large-Scale Empirical Study of Security Patches.
USENIX ;login:. 43(1),
(2018). Scanning the Internet for Liveness.
Computer Communication Review. 48(2),
(2018). Toward Continual Measurement of Global Network-Level Censorship.
Security and Privacy. 16(1),
(2018). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019). Corelight Sensors detect the ChaChi RAT.
Security Boulevard.
(2021). Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium. 3093-3110.
(2021).