Author of the publication

UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware.

, , , , and . USENIX Security Symposium, page 757-772. USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optical Delusions: A Study of Malicious QR Codes in the Wild., , , , and . DSN, page 192-203. IEEE Computer Society, (2014)Surveylance: Automatically Detecting Online Survey Scams., , and . IEEE Symposium on Security and Privacy, page 70-86. IEEE Computer Society, (2018)Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions., , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 441-459. Springer, (2016)Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance., , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 415-436. Springer, (2016)UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware., , , , and . USENIX Security Symposium, page 757-772. USENIX Association, (2016)Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance., , and . CoRR, (2018)Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks., , , , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 3-24. Springer, (2015)Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions., , and . CoRR, (2018)Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild., , , , , , , , and . WWW, page 840-852. ACM, (2019)USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks., , , , and . RAID, page 89-103. USENIX Association, (2019)