Author of the publication

Exploitable Redirects on the Web: Identification, Prevalence, and Defense.

, , and . WOOT, USENIX Association, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolvers Revealed: Characterizing DNS Resolvers and their Clients., and . ACM Trans. Internet Techn., 12 (4): 14:1-14:17 (2013)Abnormally Malicious Autonomous Systems and Their Internet Connectivity., , and . IEEE/ACM Trans. Netw., 20 (1): 220-230 (2012)Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems., , and . INFOCOM, page 326-330. IEEE, (2010)Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly., , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 448-465. Springer, (2010)An empirical study of orphan DNS servers in the internet., , , , and . Internet Measurement Conference, page 308-314. ACM, (2010)A Unified Approach to Intra-domain Security., , and . CSE (3), page 219-224. IEEE Computer Society, (2009)Phishing Infrastructure Fluxes All the Way., , and . IEEE Security & Privacy, 7 (5): 21-28 (2009)The web is smaller than it seems., , and . Internet Measurement Conference, page 123-128. ACM, (2007)Touring DNS Open Houses for Trends and Configurations., , and . IEEE/ACM Trans. Netw., 19 (6): 1666-1675 (2011)Pollution Resilience for DNS Resolvers., and . ICC, page 1-5. IEEE, (2009)