Deep Android Malware Detection N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ... Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 559 | 2017 |
Why Johnny can’t pentest: an analysis of black-box web vulnerability scanners A Doupé, M Cova, G Vigna Detection of Intrusions and Malware, and Vulnerability Assessment, 111-131, 2010 | 385 | 2010 |
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner A Doupé, L Cavedon, C Kruegel, G Vigna 21st USENIX Security Symposium (USENIX Security 12), 523-538, 2012 | 230 | 2012 |
Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin K Liao, Z Zhao, A Doupé, GJ Ahn Proceedings of the Symposium on Electronic Crime Research (eCrime), 2016 | 211 | 2016 |
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ... 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 146 | 2020 |
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis A Oest, Y Safei, A Doupé, GJ Ahn, B Wardman, G Warner 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018 | 144 | 2018 |
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ... Symposium on Network and Distributed System Security (NDSS), 2016 | 136 | 2016 |
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam H Tu, A Doupé, Z Zhao, GJ Ahn Proceedings of the IEEE Symposium on Security and Privacy, 2016 | 125 | 2016 |
A Large-Scale Study of Mobile Web App Security P Mutchler, A Doupé, J Mitchell, C Kruegel, G Vigna Proceedings of the Mobile Security Technologies Workshop (MoST), 2015 | 124 | 2015 |
Matched and mismatched SOCs: A qualitative study on security operations center issues FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 121 | 2019 |
Phishfarm: A scalable framework for measuring the effectiveness of evasion techniques against browser phishing blacklists A Oest, Y Safaei, A Doupé, GJ Ahn, B Wardman, K Tyers 2019 IEEE Symposium on Security and Privacy (SP), 1344-1361, 2019 | 118 | 2019 |
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ... 29th USENIX Security Symposium (USENIX Security 20), 379-396, 2020 | 101 | 2020 |
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ... 2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021 | 92 | 2021 |
Ten Years of iCTF: The Good, the Bad, and the Ugly G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ... The USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014 | 85 | 2014 |
HoneyMix: Toward SDN-based Intelligent Honeynet W Han, Z Zhao, A Doupé, GJ Ahn ACM International Workshop on Security in Software Defined Networks and …, 2016 | 82 | 2016 |
Toward a Moving Target Defense for Web Applications M Taguinod, A Doupé, Z Zhao, GJ Ahn IEEE International Conference on Information Reuse and Integration (IRI), 2015 | 82 | 2015 |
Fear the ear: discovering and mitigating execution after redirect vulnerabilities A Doupé, B Boe, C Kruegel, G Vigna Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 79 | 2011 |
deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation A Doupé, W Cui, MH Jakubowski, M Peinado, C Kruegel, G Vigna Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 78 | 2013 |
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications. S Sengupta, SG Vadlamudi, S Kambhampati, A Doupé, Z Zhao, ... AAMAS 1, 178-186, 2017 | 73 | 2017 |
Honeyplc: A next-generation honeypot for industrial control systems E López-Morales, C Rubio-Medrano, A Doupé, Y Shoshitaishvili, R Wang, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 69 | 2020 |