Articles with public access mandates - Elie BurszteinLearn more
Available somewhere: 14
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017
Mandates: US National Science Foundation, US Department of Defense
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
Mandates: US National Science Foundation
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Mandates: US National Science Foundation
The Security Impact of HTTPS Interception.
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
NDSS, 2017
Mandates: US National Science Foundation, US Department of Energy
Users really do plug in USB drives they find
M Tischer, Z Durumeric, S Foster, S Duan, A Mori, E Bursztein, M Bailey
2016 IEEE symposium on security and privacy (SP), 306-319, 2016
Mandates: US National Science Foundation
Sok: Hate, harassment, and the changing landscape of online abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021
Mandates: US National Science Foundation
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
Mandates: US National Science Foundation
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016
Mandates: US National Science Foundation
Designing toxic content classification for a diversity of perspectives
D Kumar, PG Kelley, S Consolvo, J Mason, E Bursztein, Z Durumeric, ...
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 299-318, 2021
Mandates: US National Science Foundation
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
Mandates: US National Science Foundation
The abuse sharing economy: Understanding the limits of threat exchanges
K Thomas, R Amira, A Ben-Yoash, O Folger, A Hardon, A Berger, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
Mandates: US National Science Foundation
Pinning down abuse on google maps
DY Huang, D Grundman, K Thomas, A Kumar, E Bursztein, K Levchenko, ...
Proceedings of the 26th International Conference on World Wide Web, 1471-1479, 2017
Mandates: US National Science Foundation
The danger of USB drives
M Tischer, Z Durumeric, E Bursztein, M Bailey
IEEE Security & Privacy 15 (2), 62-69, 2017
Mandates: US National Science Foundation
{FirmSolo}: Enabling dynamic analysis of binary Linux-based {IoT} kernel modules
I Angelakopoulos, G Stringhini, M Egele
32nd USENIX Security Symposium (USENIX Security 23), 5021-5038, 2023
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program