Lens on the Endpoint: Hunting for Malicious Software through Endpoint Data Analysis.
Ahmet Buyukkayhan, Alina Oprea, Zhou Li, William Robertson.
In
Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID).
.
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers.
Tobias Lauinger, Abdelberi Chaabane, Ahmet Buyukkayhan, Kaan Onarlioglu, William Robertson.
In
Proceedings of the USENIX Security Symposium.
.
Semi-automated Discovery of Server-Based Information Oversharing Vulnerabilities in Android Applications.
Wil Koch, Abdelberi Chaabane, Manuel Egele, William Robertson, Engin Kirda.
In
Proceedings of the International Symposium on Software Testing and Analysis (ISSTA).
.
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Tobias Lauinger, Abdelberi Chaabane, William Robertson, Christo Wilson, Engin Kirda.
In
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS).
.
WHOIS Lost in Translation: (Mis)Understanding Internet Domain Name Expiration and Re-Registration.
Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda.
In
Proceedings of the ACM Internet Measurement Conference (IMC).
.
Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance.
sajjad_arshad, amin_kharraz, wkr.
In
.
.
Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance.
Sajjad Arshad, Amin Kharraz, William Robertson.
In
Proceedings of the International Conference on Research in Attacks, Intrusions, and Defenses (RAID).
.
Trellis: Privilege Separation for Multi-User Applications Made Easy.
Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero.
In
Proceedings of the International Conference on Research in Attacks, Intrusions, and Defenses (RAID).
.
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.
Matthias Neugschwandtner, Collin Mulliner, William Robertson, Engin Kirda.
In
Proceedings of the International Conference on Trust & Trustworthy Computing (TRUST).
.
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.
Muhammad Bashir, Sajjad Arshad, William Robertson, Christo Wilson.
In
Proceedings of the USENIX Security Symposium.
.