Publications
Peer-Reviewed
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
Proceedings of the 27th International Symposium on Recent Advances in Intrusion Detection (RAID),
Are You Sure You Want To Do Coordinated Vulnerability Disclosure?
Proceedings of the 9th International Workshop on Traffic Measurements for Cybersecurity (WTMC),
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis
Proceedings of the 30th ACM SIGSAC Conference on Computer and Communications Security (CCS),
Pushing Boundaries: An Empirical View on the Digital Sovereignty of Six Governments in the Midst of Geopolitical Tensions
Government Information Quarterly (GIQ) (Volume 40, Issue 4),
Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale
Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS),
Designing for Tussle in Encrypted DNS
Proceedings of the 20th Workshop on Hot Topics in Networking (HotNets),
Cyber Grand Shellphish
Phrack (Volume 15, Issue 70),
Authors listed alphabetically.
Encryption without Centralization: Distributing DNS Queries Across Recursive Resolvers
Proceedings of the 2021 Applied Networking Research Workshop (ANRW),
Extended abstract. Co-located with IETF 105.
Can Encrypted DNS Be Fast?
Proceedings of the 22nd Passive and Active Measurement (PAM),
Those Who Know Don't, Those Who Don't Know Deploy: Understanding Security Awareness in the Adoption of Industrial IoT
Proceedings of the 20th Workshop on the Economics of Information Security (WEIS),
Identifying Disinformation Websites Using Infrastructure Features
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet,
Understanding The Performance Costs and Benefits of Privacy-focused Browser Extensions
Proceedings of the 29th The Web Conference (TheWebConf, formerly known as WWW),
Comparing the Effects of DNS, DoT, and DoH on Web Performance
Proceedings of the 29th The Web Conference (TheWebConf, formerly known as WWW),
How DNS over HTTPS is Reshaping Privacy, Performance, and Policy in the Internet Ecosystem
Proceedings of the 47th Research Conference on Communications, Information and Internet Policy (TPRC),
Authors listed alphabetically.
Analyzing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web
Proceedings of the 2019 Applied Networking Research Workshop (ANRW),
Extended abstract. Co-located with IETF 105.
Investigating Operators' Perspective on Security Misconfigurations
Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS),
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks
Proceedings of the 27th USENIX Security Symposium (USENIX Security),
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
Proceedings of the 2018 Applied Networking Research Workshop (ANRW),
Extended abstract. Co-located with IETF 102.
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
Proceedings of the 39th IEEE Symposium on Security & Privacy (S&P),
Mechanical Phish: Resilient Autonomous Hacking
IEEE Security & Privacy,
In rDNS We Trust: Revisiting a Common Data-Source's Reliability
Proceedings of the 19th Passive and Active Measurement (PAM),
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
Proceedings of the 25th Network and Distributed System Security Symposium (NDSS),
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
Proceedings of the 18th Passive and Active Measurement (PAM),
Drops for Stuff: An Analysis of Reshipping Mule Scams
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS),
Meerkat: Detecting Website Defacements through Image-based Object Recognition
Proceedings of the 24th USENIX Security Symposium (USENIX Security),
Internet Defense Prize Finalist.
What You Submit is Who You Are: A Multi-Modal Approach for Deanonymizing Scientific Publications
IEEE Transactions on Information Forensics and Security (TIFS) (Volume 10, Issue 1),
Protecting Web Single Sign-on against Relying Party Impersonation Attacks through a Bi-directional Secure Channel with Authentication
Proceedings of the 17th International Symposium on Recent Advances in Intrusion Detection (RAID),
Ten Years of iCTF: The Good, The Bad, and The Ugly
Proceedings of the 1st USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE),
Relevant Change Detection: Framework for the Precise Extraction of Modified and Novel Web-based Content as a Filtering Technique for Analysis Engines
Proceedings of the 23rd World Wide Web Conference (WWW),
Developers' Track.
Delta: Automatic Identification of Unknown Web-based Infection Campaigns
Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS),