Deepak Kumar
Deepak Kumar
Email verificata su stanford.edu - Home page
Titolo
Citata da
Citata da
Anno
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017
9482017
Skill Squatting Attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
792018
Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
27th USENIX Security Symposium (USENIX Security 18), 2018
542018
All Things Considered: An Analysis of IoT Devices on Home Networks
D Kumar, K Shen, B Case, D Garg, G Alperovich, D Kuznetsov, ...
28th USENIX Security Symposium, 2019
532019
Tracking Certificate Misissuance in the Wild
D Kumar, M Bailey, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, ...
Tracking Certificate Misissuance in the Wild, 0, 2018
442018
Security Challenges in an Increasingly Tangled Web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
26th International World Wide Web Conference, 2017, 2017
352017
SoK: Plug & Pray Today: Understanding USB Insecurity in Versions 1 through C
J Tian, N Scaife, D Kumar, M Bailey, A Bates, K Butler
IEEE Symposium on Security and Privacy, 15, 2018
192018
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
52020
Sok: Hate, harassment, and the changing landscape of online abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
22021
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–9