Obserwuj
Kevin Borgolte
Tytuł
Cytowane przez
Cytowane przez
Rok
Investigating System Operators' Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
25th ACM SIGSAC Conference on Computer & Communications Security (CCS), 2018
1342018
Delta: Automatic Identification of Unknown Web-based Infection Campaigns
K Borgolte, C Kruegel, G Vigna
20th ACM SIGSAC Conference on Computer & Communications Security (CCS), 109-120, 2013
922013
Ten Years of iCTF: The Good, The Bad, and The Ugly
G Vigna, K Borgolte, J Corbetta, A Doupé, Y Fratantonio, L Invernizzi, ...
1st USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
872014
Meerkat: Detecting Website Defacements through Image-based Object Recognition
K Borgolte, C Kruegel, G Vigna
24th USENIX Security Symposium (USENIX Security), 2015
782015
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna
18th International Conference on Passive and Active Network Measurement (PAM), 2017
712017
How DNS over HTTPS is Reshaping Privacy, Performance, and Policy in the Internet Ecosystem
K Borgolte, T Chattopadhyay, N Feamster, M Kshirsagar, J Holland, ...
47th Research Conference on Communications, Information and Internet Policy …, 2019
692019
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna
25th Network and Distributed Systems Security Symposium (NDSS), 2018
662018
Comparing the effects of DNS, DoT, and DoH on web performance
A Hounsel, K Borgolte, P Schmitt, J Holland, N Feamster
Proceedings of The Web Conference 2020, 562-572, 2020
652020
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
K Borgolte, S Hao, T Fiebig, G Vigna
39th IEEE Symposium on Security & Privacy (S&P), 2018
562018
Identifying Disinformation Websites Using Infrastructure Features
A Hounsel, J Holland, B Kaiser, K Borgolte, N Feamster, J Mayer
arXiv preprint arXiv:2003.07684, 2020
512020
Drops for Stuff: An Analysis of Reshipping Mule Scams
S Hao, K Borgolte, N Nikiforakis, G Stringhini, M Egele, M Eubanks, ...
22nd ACM SIGSAC Conference on Computer & Communications Security (CCS), 2015
462015
Analyzing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web
A Hounsel, K Borgolte, P Schmitt, J Holland, N Feamster
arXiv preprint arXiv:1907.08089, 2019
382019
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks
W Meng, C Qian, S Hao, K Borgolte, G Vigna, C Kruegel, W Lee
27th USENIX Security Symposium (USENIX Security), 2018
372018
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications
M Payer, L Huang, NZ Gong, K Borgolte, M Frank
IEEE Transactions on Information Forensics and Security 10 (1), 200-212, 2015
372015
Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel
Y Cao, Y Shoshitaishvili, K Borgolte, C Kruegel, G Vigna, Y Chen
17th International Symposium on Research in Attacks, Intrusions and Defense …, 2014
37*2014
In rDNS We Trust: Revisiting a Common Data-Source’s Reliability
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna, A Feldmann
19th International Conference on Passive and Active Network Measurement (PAM), 2018
362018
Understanding the performance costs and benefits of privacy-focused browser extensions
K Borgolte, N Feamster
Proceedings of The Web Conference 2020, 2275-2286, 2020
322020
Human factors in security research: Lessons learned from 2008-2018
M Kaur, M van Eeten, M Janssen, K Borgolte, T Fiebig
arXiv preprint arXiv:2103.13287, 2021
302021
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
302018
Can Encrypted DNS Be Fast?
A Hounsel, P Schmitt, K Borgolte, N Feamster
Passive and Active Measurement: 22nd International Conference, PAM 2021 …, 2021
272021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20