The matter of heartbleed Z Durumeric, F Li, J Kasten, N Weaver, J Amann, J Beekman, M Payer, ... Proceedings of the 2014 Conference on Internet Measurement Conference, 475-488, 2014 | 1055 | 2014 |
An Ideal-Security Protocol for Order-Preserving Encoding. RA Popa, FH Li, N Zeldovich IEEE S&P 2013, 2013 | 520 | 2013 |
A large-scale empirical study of security patches F Li, V Paxson Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 253 | 2017 |
Data breaches, phishing, or malware? Understanding the risks of stolen credentials K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ... Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 241 | 2017 |
Global measurement of {DNS} manipulation P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson 26th USENIX Security Symposium (USENIX Security 17), 307-323, 2017 | 194 | 2017 |
Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale DY Huang, N Apthorpe, F Li, G Acar, N Feamster Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020 | 193 | 2020 |
You've got vulnerability: Exploring effective vulnerability notifications F Li, Z Durumeric, J Czyz, M Karami, M Bailey, D McCoy, S Savage, ... 25th USENIX Security Symposium (USENIX Security 16), 1033-1050, 2016 | 164 | 2016 |
Privacy and accountability for location-based aggregate statistics RA Popa, AJ Blumberg, H Balakrishnan, FH Li Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 155 | 2011 |
Target generation for internet-wide IPv6 scanning A Murdock, F Li, P Bramsen, Z Durumeric, V Paxson Proceedings of the 2017 Internet Measurement Conference, 242-253, 2017 | 107 | 2017 |
Augur: Internet-wide detection of connectivity disruptions P Pearce, R Ensafi, F Li, N Feamster, V Paxson 2017 IEEE Symposium on Security and Privacy (SP), 427-443, 2017 | 98 | 2017 |
Didn't You Hear Me?---Towards More Successful Web Vulnerability Notifications B Stock, G Pellegrino, F Li, M Backes, C Rossow CISPA, 2018 | 96 | 2018 |
Consequences of connectivity: Characterizing account hijacking on twitter K Thomas, F Li, C Grier, V Paxson Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 93 | 2014 |
Remedying web hijacking: Notification effectiveness and webmaster comprehension F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016 | 78 | 2016 |
Web-based attacks to discover and control local IoT devices G Acar, DY Huang, F Li, A Narayanan, N Feamster Proceedings of the 2018 Workshop on IoT Security and Privacy, 29-35, 2018 | 69 | 2018 |
SybilControl: Practical Sybil defense with computational puzzles F Li, P Mittal, M Caesar, N Borisov Proceedings of the seventh ACM workshop on Scalable trusted computing, 67-78, 2012 | 66 | 2012 |
Keepers of the machines: Examining how system administrators manage software updates for multiple machines F Li, L Rogers, A Mathur, N Malkin, M Chetty Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 273-288, 2019 | 65 | 2019 |
Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses A Anwar, A Abusnaina, S Chen, F Li, D Mohaisen IEEE Transactions on Dependable and Secure Computing 19 (6), 4255-4269, 2021 | 62 | 2021 |
Deep entity classification: Abusive account detection for online social networks T Xu, G Goossen, HK Cevahir, S Khodeir, Y Jin, F Li, S Shan, S Patel, ... 30th {USENIX} Security Symposium ({USENIX} Security 21), 2021 | 48 | 2021 |
Exploring privacy preservation in outsourced k-nearest neighbors with multiple data owners F Li, R Shin, V Paxson Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 53-64, 2015 | 40 | 2015 |
Data-confined HTML5 applications D Akhawe, F Li, W He, P Saxena, D Song Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 31 | 2013 |