Publications


  • It's Not What It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. Florian Quinkert, Tobias Lauinger, William Robertson, Engin Kirda, Thorsten Holz. In Proceedings of the IEEE Conference on Communications and Network Security (CNS). .
  • Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research. Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William Robertson, Engin Kirda. In Proceedings of the International Conference on Passive and Active Network Measurement (PAM). .
  • On the Effectiveness of Type-based Control Flow Integrity. Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William Robertson, Engin Kirda, Hamed Okhravi. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). .
  • From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. Tobias Lauinger, Abdelberi Chaabane, Ahmet Buyukkayhan, William Robertson, Engin Kirda. In Proceedings of the ACM Internet Measurement Conference (IMC). .
  • How Tracking Companies Circumvent Ad Blockers Using WebSockets. Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William Robertson, Christo Wilson. In Proceedings of the ACM Internet Measurement Conference (IMC). .
  • Surveylance: Automatically Detecting Online Survey Scams. Amin Kharraz, William Robertson, Engin Kirda. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland). .
  • ERASER: Your Data Won't Be Back. Kaan Onarlioglu, William Robertson, Engin Kirda. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroSP). .
  • Large-Scale Analysis of Style Injection by Relative Path Overwrite. Sajjad Arshad, Seyed Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William Robertson. In Proceedings of the Web Conference (WWW). .
  • Ex-Ray: Detection of History-Leaking Browser Extensions. Michael Weissbacher, Enrico Mariconti, Guillermo Suarez de Tangil, Gianluca Stringhini, William Robertson, Engin Kirda. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). .
  • Lens on the Endpoint: Hunting for Malicious Software through Endpoint Data Analysis. ahmet_buyukkayhan, alina_oprea, zhou_li, wkr. In . .