Adam Doupé
TitoloCitata daAnno
Why Johnny can’t pentest: an analysis of black-box web vulnerability scanners
A Doupé, M Cova, G Vigna
Detection of Intrusions and Malware, and Vulnerability Assessment, 111-131, 2010
2342010
Enemy of the state: A state-aware black-box web vulnerability scanner
A Doupé, L Cavedon, C Kruegel, G Vigna
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
992012
Deep Android Malware Detection
N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ...
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
652017
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy
V Afonso, A Bianchi, Y Fratantonio, A Doupé, M Polino, P de Geus, ...
Symposium on Network and Distributed System Security (NDSS), 2016
572016
Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin
K Liao, Z Zhao, A Doupé, GJ Ahn
Proceedings of the Symposium on Electronic Crime Research (eCrime), 2016
532016
A Large-Scale Study of Mobile Web App Security
P Mutchler, A Doupé, J Mitchell, C Kruegel, G Vigna
Proceedings of the Mobile Security Technologies Workshop (MoST), 2015
532015
deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation
A Doupé, W Cui, MH Jakubowski, M Peinado, C Kruegel, G Vigna
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
522013
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
A Doupé, B Boe, C Kruegel, G Vigna
Proceedings of the 18th ACM conference on Computer and communications …, 2011
462011
Hit ’em Where it Hurts: A Live Security Exercise on Cyber Situational Awareness
A Doupé, M Egele, B Caillat, G Stringhini, G Yakin, A Zand, L Cavedon, ...
Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2011
422011
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
H Tu, A Doupé, Z Zhao, GJ Ahn
Proceedings of the IEEE Symposium on Security and Privacy, 2016
412016
Ten Years of iCTF: The Good, the Bad, and the Ugly
G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ...
The USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
362014
HoneyMix: Toward SDN-based Intelligent Honeynet
W Han, Z Zhao, A Doupé, GJ Ahn
ACM International Workshop on Security in Software Defined Networks and …, 2016
302016
Toward a Moving Target Defense for Web Applications
M Taguinod, A Doupé, Z Zhao, GJ Ahn
IEEE International Conference on Information Reuse and Integration (IRI), 2015
262015
Moving target defense for web applications using bayesian stackelberg games
SG Vadlamudi, S Sengupta, M Taguinod, Z Zhao, A Doupé, GJ Ahn, ...
Proceedings of the 2016 International Conference on Autonomous Agents …, 2016
222016
Target Fragmentation in Android Apps
P Mutchler, Y Safaei, A Doupé, J Mitchell
Proceedings of the Mobile Security Technologies Workshop (MoST), 2016
212016
A game theoretic approach to strategy generation for moving target defense in web applications
S Sengupta, SG Vadlamudi, S Kambhampati, A Doupé, Z Zhao, ...
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent …, 2017
192017
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security
Y Shoshitaishvili, L Invernizzi, A Doupe, G Vigna
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1649-1656, 2014
132014
Towards Automated Threat Intelligence Fusion
A Modi, Z Sun, A Panwar, T Khairnar, Z Zhao, A Doupé, GJ Ahn, P Black
Proceedings of the IEEE International Conference on Collaboration and …, 2016
122016
Toward Authenticated Caller ID Transmission: The Need for a Standardized Authentication Scheme in Q.731.3 Calling Line Identification Presentation
H Tu, A Doupé, Z Zhao, GJ Ahn
Proceedings of the ITU Kaleidoscope (ITU), 2016
122016
Honeyproxy: Design and implementation of next-generation honeynet via sdn
S Kyung, W Han, N Tiwari, VH Dixit, L Srinivas, Z Zhao, A Doupé, GJ Ahn
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
112017
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20