M E A S U R E M E N T
Blog posts, Publications and Talks
055
Filter by
Unmasking the ransomware kingpins
Blog post - security - Oct 2017
How to trace ransomware payments end-to-end
Blog post - security - Aug 2017
Understanding the Mirai Botnet
Publication - network security - Usenix Security 2017
Pinning Down Abuse on Google Maps
Publication - anti-abuse - WWW 2017
The Security Impact of HTTPS Interception
Publication - web security - NDSS 2017
Does dropping usb drives really work?
Talk - hacking - BH USA 2016
Users really do plug in usb drives they find
Publication - security - S&P 2016
Dialing back abuse on phone verified accounts
Publication - anti-abuse - CCS 2014
The end is nigh: generic solving of text-based captchas
Publication - web security - WOOT 2014
Meaning matters: why google switched to numeric captchas
Blog post - user experience - Apr 2014
Online microsurveys for user experience research
Publication - user experience - CHI 2014
Google docs used in a spam campaign
Blog post - anti-abuse - Dec 2011
What phishing sites look like ? (study)
Blog post - anti-abuse - Nov 2011
Text-based captcha strengths and weaknesses
Publication - web security - CCS 2011
Some insights about password shapes
Blog post - security - Feb 2011
Kamouflage loss-resistant password management
Publication - security - ESORICS 2010
An analysis of private browsing modes in modern browsers
Publication - privacy - Usenix Security 2010
Webseclab security education workbench
Publication - web security - CEST 2010
Trackback spam abuse and prevention
Publication - web security - CCSW 2009
Time has something to tell us about network address translation
Publication - network security - NordSec 2007
JOIN