关注
Kevin Borgolte
标题
引用次数
引用次数
年份
Investigating System Operators' Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
25th ACM SIGSAC Conference on Computer & Communications Security (CCS), 2018
1292018
Delta: Automatic Identification of Unknown Web-based Infection Campaigns
K Borgolte, C Kruegel, G Vigna
20th ACM SIGSAC Conference on Computer & Communications Security (CCS), 109-120, 2013
902013
Ten Years of iCTF: The Good, The Bad, and The Ugly
G Vigna, K Borgolte, J Corbetta, A Doupé, Y Fratantonio, L Invernizzi, ...
1st USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
852014
Meerkat: Detecting Website Defacements through Image-based Object Recognition
K Borgolte, C Kruegel, G Vigna
24th USENIX Security Symposium (USENIX Security), 2015
772015
How DNS over HTTPS is Reshaping Privacy, Performance, and Policy in the Internet Ecosystem
K Borgolte, T Chattopadhyay, N Feamster, M Kshirsagar, J Holland, ...
47th Research Conference on Communications, Information and Internet Policy …, 2019
652019
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna
18th International Conference on Passive and Active Network Measurement (PAM), 2017
642017
Comparing the effects of DNS, DoT, and DoH on web performance
A Hounsel, K Borgolte, P Schmitt, J Holland, N Feamster
Proceedings of The Web Conference 2020, 562-572, 2020
612020
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna
25th Network and Distributed Systems Security Symposium (NDSS), 2018
612018
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
K Borgolte, S Hao, T Fiebig, G Vigna
39th IEEE Symposium on Security & Privacy (S&P), 2018
552018
Identifying Disinformation Websites Using Infrastructure Features
A Hounsel, J Holland, B Kaiser, K Borgolte, N Feamster, J Mayer
arXiv preprint arXiv:2003.07684, 2020
442020
Drops for Stuff: An Analysis of Reshipping Mule Scams
S Hao, K Borgolte, N Nikiforakis, G Stringhini, M Egele, M Eubanks, ...
22nd ACM SIGSAC Conference on Computer & Communications Security (CCS), 2015
442015
Analyzing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web
A Hounsel, K Borgolte, P Schmitt, J Holland, N Feamster
arXiv preprint arXiv:1907.08089, 2019
372019
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks
W Meng, C Qian, S Hao, K Borgolte, G Vigna, C Kruegel, W Lee
27th USENIX Security Symposium (USENIX Security), 2018
372018
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications
M Payer, L Huang, NZ Gong, K Borgolte, M Frank
IEEE Transactions on Information Forensics and Security 10 (1), 200-212, 2015
372015
Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel
Y Cao, Y Shoshitaishvili, K Borgolte, C Kruegel, G Vigna, Y Chen
17th International Symposium on Research in Attacks, Intrusions and Defense …, 2014
36*2014
In rDNS We Trust: Revisiting a Common Data-Source’s Reliability
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna, A Feldmann
19th International Conference on Passive and Active Network Measurement (PAM), 2018
332018
Understanding the performance costs and benefits of privacy-focused browser extensions
K Borgolte, N Feamster
Proceedings of The Web Conference 2020, 2275-2286, 2020
302020
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
292018
Can Encrypted DNS Be Fast?
A Hounsel, P Schmitt, K Borgolte, N Feamster
Passive and Active Measurement: 22nd International Conference, PAM 2021 …, 2021
252021
Human factors in security research: Lessons learned from 2008-2018
M Kaur, M van Eeten, M Janssen, K Borgolte, T Fiebig
arXiv preprint arXiv:2103.13287, 2021
242021
系统目前无法执行此操作,请稍后再试。
文章 1–20