theme image

network security

network security
profile
Taking down Gooligan part 3 — monetization and clean-up
network security

Taking down Gooligan part 3 — monetization and clean-up

Mar 2018

Taking down Gooligan: part 2 — inner workings
network security

Taking down Gooligan: part 2 — inner workings

Mar 2018

Taking down Gooligan: part 1 — overview
network security

Taking down Gooligan: part 1 — overview

Mar 2018

Hunting down Gooligan — retrospective analysis
network security

Hunting down Gooligan — retrospective analysis

Botconf 2017

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis
cybersecurity

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Dec 2017

Understanding the Mirai Botnet
network security

Understanding the Mirai Botnet

Usenix Security 2017

The Security Impact of HTTPS Interception
web security

The Security Impact of HTTPS Interception

NDSS 2017

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
anti-abuse

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

RAID 2016

In-depth analysis of the lessons we learned while protecting gmail users
anti-abuse

In-depth analysis of the lessons we learned while protecting gmail users

Apr 2016

How email in transit can be intercepted using dns hijacking
network security

How email in transit can be intercepted using dns hijacking

Jan 2016

Understanding how tls downgrade attacks prevent email encryption
network security

Understanding how tls downgrade attacks prevent email encryption

Dec 2015

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security
network security

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security

IMC 2015

Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities
web security

Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities

Mar 2013

Beyond files recovery owade cloud-based forensic
hacking

Beyond files recovery owade cloud-based forensic

Black hat 2011

The emergence of cross channel scripting
web security

The emergence of cross channel scripting

CACM 2010

Using strategy objectives for network security analysis
network security

Using strategy objectives for network security analysis

Inscrypt 2009

Extending anticipation games with location penalty and timeline
network security

Extending anticipation games with location penalty and timeline

FAST 2008

Netqi a model checker for anticipation game
network security

Netqi a model checker for anticipation game

ATVA 2008

Probabilistic protocol identification for hard to classify protocol
network security

Probabilistic protocol identification for hard to classify protocol

WISTP 2008

A logical framework for evaluating network resilience against faults and attacks
network security

A logical framework for evaluating network resilience against faults and attacks

ASIAN 2007

Time has something to tell us about network address translation
network security

Time has something to tell us about network address translation

NordSec 2007

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.