Publications


  • WHOIS Lost in Translation: (Mis)Understanding Internet Domain Name Expiration and Re-Registration. Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda. In Proceedings of the ACM Internet Measurement Conference (IMC). .
  • Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance. sajjad_arshad, amin_kharraz, wkr. In . .
  • Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance. Sajjad Arshad, Amin Kharraz, William Robertson. In Proceedings of the International Conference on Research in Attacks, Intrusions, and Defenses (RAID). .
  • Trellis: Privilege Separation for Multi-User Applications Made Easy. Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero. In Proceedings of the International Conference on Research in Attacks, Intrusions, and Defenses (RAID). .
  • Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. Matthias Neugschwandtner, Collin Mulliner, William Robertson, Engin Kirda. In Proceedings of the International Conference on Trust & Trustworthy Computing (TRUST). .
  • Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. Muhammad Bashir, Sajjad Arshad, William Robertson, Christo Wilson. In Proceedings of the USENIX Security Symposium. .
  • UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. Amin Kharraz, Sajjad Arshad, Collin Mulliner, William Robertson, Engin Kirda. In Proceedings of the USENIX Security Symposium. .
  • EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. Sevtap Duman, Kubra Kalkan, Manuel Egele, William Robertson, Engin Kirda. In Proceedings of the IEEE Conferences on Computers, Software, and Applications (COMPSAC). .
  • Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. Kaan Onarlioglu, William Robertson, Engin Kirda. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). .
  • LAVA: Large-scale Automated Vulnerability Addition. Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William Robertson, Frederick Ulrich, Ryan Whelan. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland). .