default search action
Adam Doupé
Person information
- affiliation: Arizona State University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c89]Rana Pourmohamad, Steven Wirsz, Adam Oest, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Adam Doupé, Rida A. Bazzi:
Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry. AsiaCCS 2024 - [c88]Arvind S. Raj, Wil Gibbs, Fangzhou Dong, Jayakrishna Menon Vadayath, Michael Tompkins, Steven Wirsz, Yibo Liu, Zhenghao Hu, Chang Zhu, Gokulkrishna Praveen Menon, Brendan Dolan-Gavitt, Adam Doupé, Ruoyu Wang, Yan Shoshitaishvili, Tiffany Bao:
Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing. CCS 2024: 3719-3733 - [c87]Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang, Adam Doupé:
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem. CODASPY 2024: 55-65 - [c86]Vivin Paliath, Erik Trickel, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:
SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables. DIMVA 2024: 227-250 - [c85]Faezeh Kalantari, Mehrnoosh Zaeifi, Yeganeh Safaei, Marzieh Bitaab, Adam Oest, Gianluca Stringhini, Yan Shoshitaishvili, Adam Doupé:
Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers. IMC 2024: 681-703 - [c84]Zhibo Sun, Faris Bugra Kokulu, Penghui Zhang, Adam Oest, Gianluca Stringhini, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. RAID 2024: 49-64 - [c83]Irina Ford, Ananta Soneji, Faris Bugra Kokulu, Jayakrishna Vadayath, Zion Leonahenahe Basque, Gaurav Vipat, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn, Tiffany Bao, Yan Shoshitaishvili:
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them. SP 2024: 350-368 - [c82]Kuntal Kumar Pal, Ati Priya Bajaj, Pratyay Banerjee, Audrey Dutcher, Mutsumi Nakamura, Zion Leonahenahe Basque, Himanshu Gupta, Saurabh Arjun Sawant, Ujjwala Anantheswaran, Yan Shoshitaishvili, Adam Doupé, Chitta Baral, Ruoyu Wang:
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning. SP 2024: 4069-4087 - [c81]Eric Olsson, Benjamin Eriksson, Adam Doupé, Andrei Sabelfeld:
Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS. USENIX Security Symposium 2024 - [c80]Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang:
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation. USENIX Security Symposium 2024 - [c79]Wil Gibbs, Arvind S. Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier J. Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang:
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services. USENIX Security Symposium 2024 - [c78]Ziyi Guo, Dang K. Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing:
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. USENIX Security Symposium 2024 - [c77]Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles:
"I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators. USENIX Security Symposium 2024 - [c76]Chang Zhu, Ziyang Li, Anton Xue, Ati Priya Bajaj, Wil Gibbs, Yibo Liu, Rajeev Alur, Tiffany Bao, Hanjun Dai, Adam Doupé, Mayur Naik, Yan Shoshitaishvili, Ruoyu Wang, Aravind Machiry:
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks. USENIX Security Symposium 2024 - [e2]Adam Doupé, Alyssa Milburn:
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024, Philadelphia, PA, USA, August 12-13, 2024. USENIX Association 2024 [contents] - [i9]Ziyi Guo, Dang K. Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing:
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. CoRR abs/2406.02624 (2024) - [i8]Xiang Mei, Pulkit Singh Singaria, Jordi Del Castillo, Haoran Xi, Abdelouahab Benchikh, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Hammond Pearce, Brendan Dolan-Gavitt:
ARVO: Atlas of Reproducible Vulnerabilities for Open Source Software. CoRR abs/2408.02153 (2024) - 2023
- [c75]Kyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. CCS 2023: 3093-3107 - [c74]Jaejong Baek, Pradeep Kumar Duraisamy Soundrapandian, Sukwha Kyung, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer. DSN 2023: 261-273 - [c73]Marzieh Bitaab, Haehyun Cho, Adam Oest, Zhuoer Lyu, Wei Wang, Jorij Abraham, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale. SP 2023: 2566-2583 - [c72]Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities. SP 2023: 2658-2675 - [c71]Hui Jun Tay, Kyle Zeng, Jayakrishna Menon Vadayath, Arvind S. Raj, Audrey Dutcher, Tejesh Reddy, Wil Gibbs, Zion Leonahenahe Basque, Fangzhou Dong, Zack Smith, Adam Doupé, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang:
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation. USENIX Security Symposium 2023: 5791-5808 - 2022
- [j6]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. IEEE Secur. Priv. 20(2): 10-21 (2022) - [c70]Haehyun Cho, Jinbum Park, Adam Oest, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
ViK: practical mitigation of temporal memory safety violations through object ID inspection. ASPLOS 2022: 271-284 - [c69]Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé:
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. CCS 2022: 3165-3179 - [c68]Sana Habib, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore. CCSW 2022: 23-39 - [c67]Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati:
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment. GameSec 2022: 87-106 - [c66]Pemma Reiter, Antonio M. Espinoza, Adam Doupé, Ruoyu Wang, Westley Weimer, Stephanie Forrest:
Improving source-code representations to enhance search-based software repair. GECCO 2022: 1336-1344 - [c65]Rock Stevens, Faris Bugra Kokulu, Adam Doupé, Michelle L. Mazurek:
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates. NDSS 2022 - [c64]Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
Context-Auditor: Context-sensitive Content Injection Mitigation. RAID 2022: 431-445 - [c63]Ananta Soneji, Faris Bugra Kokulu, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers. SP 2022: 1845-1862 - [c62]Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. USENIX Security Symposium 2022: 71-88 - [c61]Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili:
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. USENIX Security Symposium 2022: 413-430 - [c60]Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis:
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. USENIX Security Symposium 2022: 735-752 - [i7]Pemma Reiter, Hui Jun Tay, Westley Weimer, Adam Doupé, Ruoyu Wang, Stephanie Forrest:
Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation. CoRR abs/2202.12336 (2022) - [i6]Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
Context-Auditor: Context-sensitive Content Injection Mitigation. CoRR abs/2204.08592 (2022) - [i5]Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati:
Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment. CoRR abs/2210.15011 (2022) - 2021
- [j5]Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini:
Introduction to the ACSAC'19 Special Issue - Vol. 2. DTRAP 2(1): 1:1-1:2 (2021) - [c59]Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras:
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. AsiaCCS 2021: 407-420 - [c58]Jaswant Pakki, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Adam Doupé:
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask). Financial Cryptography (1) 2021: 117-146 - [c57]Frederico Araujo, Sailik Sengupta, Jiyong Jang, Adam Doupé, Kevin W. Hamlen, Subbarao Kambhampati:
Software Deception Steering through Version Emulation. HICSS 2021: 1-10 - [c56]Pradeep Kumar Duraisamy Soundrapandian, Tiffany Bao, Jaejong Baek, Yan Shoshitaishvili, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn:
MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts. HICSS 2021: 1-10 - [c55]Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. NDSS 2021 - [c54]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. SP 2021: 1109-1124 - [c53]Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. USENIX Security Symposium 2021: 4169-4186 - [i4]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. CoRR abs/2103.12843 (2021) - [i3]Edward C. Schrom II, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. De Boer, Adam Doupé, Roya Ensafi, Stuart I. Feldman, Bryan T. Grenfell, J. Alex Halderman, Silvie Huijben, Carlo C. Maley, Melanie E. Moses, Alan S. Perelson, Charles Perrings, Joshua B. Plotkin, Jennifer Rexford, Mohit Tiwari:
Challenges in cybersecurity: Lessons from biological defense systems. CoRR abs/2107.10344 (2021) - 2020
- [j4]Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini:
Introduction to the ACSAC'19 Special Issue - Part 1. DTRAP 1(4): 19e:1-19e:3 (2020) - [c52]Efrén López-Morales, Carlos E. Rubio-Medrano, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Gail-Joon Ahn:
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems. CCS 2020: 279-291 - [c51]Rasoul Jahanshahi, Adam Doupé, Manuel Egele:
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. AsiaCCS 2020: 445-457 - [c50]Christopher Salls, Aravind Machiry, Adam Doupé, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Exploring Abstraction Functions in Fuzzing. CNS 2020: 1-9 - [c49]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. eCrime 2020: 1-10 - [c48]Haehyun Cho, Jinbum Park, Donguk Kim, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture. MobiSys 2020: 107-120 - [c47]Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. USENIX Security Symposium 2020: 361-377 - [c46]Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé:
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. USENIX Security Symposium 2020: 379-396 - [c45]Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. WOOT @ USENIX Security Symposium 2020 - [i2]Rasoul Jahanshahi, Adam Doupé, Manuel Egele:
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. CoRR abs/2006.11996 (2020)
2010 – 2019
- 2019
- [c44]Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. CCS 2019: 1955-1970 - [c43]Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn:
Understanding and Predicting Private Interactions in Underground Forums. CODASPY 2019: 303-314 - [c42]Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
iCore: continuous and proactive extrospection on multi-core IoT devices. SAC 2019: 851-860 - [c41]Adam Doupé:
History and Future of Automated Vulnerability Analysis. SACMAT 2019: 147 - [c40]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Kevin Tyers:
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists. IEEE Symposium on Security and Privacy 2019: 1344-1361 - [c39]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Users Really Do Answer Telephone Scams. USENIX Security Symposium 2019: 1327-1340 - [c38]Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, Adam Doupé:
Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting. USENIX Security Symposium 2019: 1679-1696 - [e1]Lorenzo Cavallaro, Johannes Kinder, Adam Doupé, Zhiqiang Lin:
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation, CCS 2019, London, United Kingdom, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6834-6 [contents] - 2018
- [c37]Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. ACSAC 2018: 278-288 - [c36]Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. ACSAC 2018: 441-452 - [c35]Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn:
CacheLight: Defeating the CacheKit Attack. ASHES@CCS 2018: 65-74 - [c34]Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn:
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. CCS 2018: 664-676 - [c33]Vaibhav Hemant Dixit, Sukwha Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn:
Challenges and Preparedness of SDN-based Firewalls. SDN-NFV@CODASPY 2018: 33-38 - [c32]Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. CODASPY 2018: 161-163 - [c31]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Gary Warner:
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. eCrime 2018: 1-12 - [c30]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Challenges, Opportunities and a Framework for Web Environment Forensics. IFIP Int. Conf. Digital Forensics 2018: 11-33 - [c29]Sai Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Measuring E-mail header injections on the world wide web. SAC 2018: 1647-1656 - 2017
- [j3]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward Standardization of Authenticated Caller ID Transmission. IEEE Commun. Stand. Mag. 1(3): 30-36 (2017) - [j2]Sai Prashanth Chandramouli, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
E-mail Header Injection Vulnerabilities. it Inf. Technol. 59(2): 67 (2017) - [c28]Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Adam Doupé, Ziming Zhao, Marthony Taguinod, Gail-Joon Ahn:
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications. AAMAS 2017: 178-186 - [c27]Carlos E. Rubio-Medrano, Josephine Lamp, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control. MTD@CCS 2017: 39-49 - [c26]Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyProxy: Design and implementation of next-generation honeynet via SDN. CNS 2017: 1-9 - [c25]Adam Doupé:
Panel: Trustworthy Data Science. CODASPY 2017: 217 - [c24]Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c23]Erik Trickel, Francesco Disperati, Eric Gustafson, Faezeh Kalantari, Mike Mabey, Naveen Tiwari, Yeganeh Safaei, Adam Doupé, Giovanni Vigna:
Shell We Play A Game? CTF-as-a-service for Security Education. ASE @ USENIX Security Symposium 2017 - 2016
- [j1]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
dbling: Identifying extensions installed on encrypted web thin clients. Digit. Investig. 18 Supplement: S55-S65 (2016) - [c22]Satya Gautam Vadlamudi, Sailik Sengupta, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Subbarao Kambhampati:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract). AAMAS 2016: 1377-1378 - [c21]Yiming Jing, Gail-Joon Ahn, Adam Doupé, Jeong Hyun Yi:
Checking Intent-based Communication in Android with Intent Space Analysis. AsiaCCS 2016: 735-746 - [c20]Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyMix: Toward SDN-based Intelligent Honeynet. SDN-NFV@CODASPY 2016: 1-6 - [c19]Carlos E. Rubio-Medrano, Josephine Lamp, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control. ABAC@CODASPY 2016: 68-71 - [c18]Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black:
Towards Automated Threat Intelligence Fusion. CIC 2016: 408-416 - [c17]Kevin Liao, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. eCrime 2016: 1-13 - [c16]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation. Kaleidoscope 2016: 1-8 - [c15]Vitor Monte Afonso, Paulo L. de Geus, Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna, Adam Doupé, Mario Polino:
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. NDSS 2016 - [c14]Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng:
State-aware Network Access Management for Software-Defined Networks. SACMAT 2016: 1-11 - [c13]Patrick Mutchler, Yeganeh Safaei, Adam Doupé, John C. Mitchell:
Target Fragmentation in Android Apps. IEEE Symposium on Security and Privacy Workshops 2016: 204-213 - [c12]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. IEEE Symposium on Security and Privacy 2016: 320-338 - [i1]Satya Gautam Vadlamudi, Sailik Sengupta, Subbarao Kambhampati, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games. CoRR abs/1602.07024 (2016) - 2015
- [c11]Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward a Moving Target Defense for Web Applications. IRI 2015: 510-517 - [c10]Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Federated Access Management for Collaborative Network Environments: Framework and Case Study. SACMAT 2015: 125-134 - 2014
- [b1]Adam Doupé:
Advanced Automated Web Application Vulnerability Analysis. University of California, Santa Barbara, USA, 2014 - [c9]Yan Shoshitaishvili, Luca Invernizzi, Adam Doupé, Giovanni Vigna:
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security. SAC 2014: 1649-1656 - [c8]Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili:
Ten Years of iCTF: The Good, The Bad, and The Ugly. 3GSE 2014 - 2013
- [c7]Adam Doupé, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, Giovanni Vigna:
deDacota: toward preventing server-side XSS via automatic code and data separation. CCS 2013: 1205-1216 - [c6]Adam Doupé, Janet L. Kayfetz:
Writing groups in computer science research labs. FIE 2013: 1359-1365 - [c5]Pierre Payet, Adam Doupé, Christopher Kruegel, Giovanni Vigna:
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities. SAC 2013: 1792-1799 - 2012
- [c4]Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. USENIX Security Symposium 2012: 523-538 - 2011
- [c3]Adam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna:
Hit 'em where it hurts: a live security exercise on cyber situational awareness. ACSAC 2011: 51-61 - [c2]Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna:
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. CCS 2011: 251-262 - 2010
- [c1]Adam Doupé, Marco Cova, Giovanni Vigna:
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. DIMVA 2010: 111-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint