Understanding the Mirai Botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... 26th USENIX Security Symposium, 2017 | 2556 | 2017 |
The Matter of Heartbleed Z Durumeric, F Li, J Kasten, N Weaver, J Amann, J Beekman, M Payer, ... ACM Internet Measurement Conference (IMC), 2014 | 1076 | 2014 |
ZMap: Fast Internet-wide scanning and its security applications Z Durumeric, E Wustrow, JA Halderman 22nd USENIX Security Symposium, 2013 | 1055 | 2013 |
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ... 22nd ACM Conference on Computer and Communications Security (CCS), 2015 | 755 | 2015 |
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices N Heninger, Z Durumeric, E Wustrow, JA Halderman 21st USENIX Security Symposium, 2012 | 622 | 2012 |
A Search Engine Backed by Internet-Wide Scanning Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman 22nd ACM Conference on Computer and Communications Security (CCS), 2015 | 596 | 2015 |
Analysis of the HTTPS Certificate Ecosystem Z Durumeric, J Kasten, M Bailey, JA Halderman ACM Internet Measurement Conference (IMC), 2013 | 425 | 2013 |
Security Analysis of the Estonian Internet Voting System D Springall, T Finkenauer, Z Durumeric, J Kitcat, H Hursti, M MacAlpine, ... 21st ACM Conference on Computer and Communications Security (CCS), 2014 | 411 | 2014 |
An Internet-Wide View of Internet-Wide Scanning Z Durumeric, M Bailey, JA Halderman 23rd USENIX Security Symposium, 2014 | 236 | 2014 |
All Things Considered: An Analysis of IoT Devices on Home Networks D Kumar, K Shen, B Case, D Garg, G Alperovich, D Kuznetsov, R Gupta, ... 28th USENIX Security Symposium, 2019 | 225 | 2019 |
The Security Impact of HTTPS Interception Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ... 24th Network and Distributed Systems Symposium (NDSS), 2017 | 208 | 2017 |
Neither Snow Nor Rain Nor MITM... An Empirical Analysis of Email Delivery Security Z Durumeric, D Adrian, A Mirian, J Kasten, E Bursztein, N Lidzborski, ... ACM Internet Measurement Conference (IMC), 2015 | 183 | 2015 |
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web J Aas, R Barnes, B Case, Z Durumeric, P Eckersley, A Flores-López, ... ACM Conference on Computer and Communications Security (CCS), 2019 | 166 | 2019 |
You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications F Li, Z Durumeric, J Czyz, M Karami, M Bailey, D McCoy, S Savage, ... 25th USENIX Security Symposium, 2016 | 165 | 2016 |
Users Really Do Plug in USB Drives They Find M Tischer, Z Durumeric, S Foster, S Duan, A Mori, E Bursztein, M Bailey 37th IEEE Symposium on Security & Privacy ("Oakland"), 2016 | 153 | 2016 |
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ... 42nd IEEE Symposium on Security & Privacy ("Oakland"), 2021 | 150 | 2021 |
An Internet-Wide View of ICS Devices A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ... 14th IEEE Privacy, Security and Trust Conference (PST), 2016 | 134 | 2016 |
Towards a Complete View of the Certificate Ecosystem B VanderSloot, J Amann, M Bernhard, Z Durumeric, M Bailey, ... 16th ACM Internet Measurement Conference (IMC), 2016 | 126 | 2016 |
Tracking Certificate Misissuance in the Wild D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ... 39th IEEE Symposium on Security & Privacy ("Oakland"), 2018 | 110 | 2018 |
Target Generation for Internet-wide IPv6 Scanning A Murdock, F Li, P Bramsen, Z Durumeric, V Paxson ACM Internet Measurement Conference (IMC), 2017 | 108 | 2017 |