• 504 Citations
  • 12 h-Index
20102024

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 504 Citations
  • 12 h-Index
  • 36 Conference contribution
  • 3 Paper
  • 2 Article
  • 1 Chapter
2019

Everyone is different: Client-side diversification for defending against extension fingerprinting

Trickel, E., Starov, O., Kapravelos, A., Nikiforakis, N. & Doupé, A., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1679-1696 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ICORe: Continuous and proactive extrospection on multi-core IoT devices

Zhang, P., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Jan 1 2019, p. 851-860. 10 p.

Research output: Contribution to conferencePaper

Matched and mismatched SOCs: A qualitative study on security operations center issues

Kokulu, F. B., Shoshitaishvili, Y., Soneji, A., Zhao, Z., Ahn, G. J., Bao, T. & Doupé, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1955-1970 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations

PhishFarm: A scalable framework for measuring the effectiveness of evasion techniques against browser phishing blacklists

Oest, A., Safaei, Y., Doupe, A., Ahn, G. J., Wardman, B. & Tyers, K., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 1344-1361 18 p. 8835369. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Understanding and detecting private interactions in underground forums

Sun, Z., Rubio-Medrano, C. E., Zhao, Z., Bao, T., Doupe, A. & Ahn, G-J., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 303-314 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Users really do answer telephone scams

Tu, H., Doupé, A., Zhao, Z. & Ahn, G. J., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1327-1340 14 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Oest, A., Safei, Y., Doupe, A., Ahn, G-J., Wardman, B. & Warner, G., Jun 8 2018, Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018. IEEE Computer Society, Vol. 2018-May. p. 1-12 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Measuring E-mail header injections on the world wide web

Chandramouli, S. P., Bajan, P. M., Kruegel, C., Vigna, G., Zhao, Z., Doupe, A. & Ahn, G-J., Apr 9 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. Association for Computing Machinery, Vol. Part F137816. p. 1647-1656 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Secore: Continuous extrospection with high visibility on multi-core ARM platforms

Zhang, P., Ngabonziza, B., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 161-163 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

A game theoretic approach to strategy generation for moving target defense in web applications

Sengupta, S., Vadlamudi, S. G., Kambhampati, S., Doupe, A., Zhao, Z., Taguinod, M. & Ahn, G-J., Jan 1 2017, 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 1. p. 178-186 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Deep android malware detection

McLaughlin, N., Del Rincon, J. M., Kang, B. J., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 301-308 8 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

79 Scopus citations

HoneyProxy: Design and implementation of next-generation honeynet via SDN

Kyung, S., Han, W., Tiwari, N., Dixit, V. H., Srinivas, L., Zhao, Z., Doupe, A. & Ahn, G-J., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Mutated policies: Towards proactive attribute-based defenses for access control

Rubio-Medrano, C. E., Lamp, J., Doupe, A., Zhao, Z. & Ahn, G-J., Oct 30 2017, MTD 2017 - Proceedings of the 2017 Workshop on Moving Target Defense, co-located with CCS 2017. Association for Computing Machinery, Inc, Vol. 2017-January. p. 39-49 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Panel: Trustworthy data science

Doupe, A., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 217 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation

Tu, H., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 4 2017, Proceedings of the 2016 ITU Kaleidoscope Academic Conference: ICTs for a Sustainable World, ITU WT 2016. Institute of Electrical and Electronics Engineers Inc., 7805728

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Towards automated threat intelligence fusion

Modi, A., Sun, Z., Panwar, A., Khairnar, T., Zhao, Z., Doupe, A., Ahn, G-J. & Black, P., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 408-416 9 p. 7809731

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Toward Standardization of Authenticated Caller ID Transmission

Tu, H., Doupe, A., Zhao, Z. & Ahn, G. J., Sep 2017, In : IEEE Communications Standards Magazine. 1, 3, p. 30-36 7 p., 8082579.

Research output: Contribution to journalArticle

3 Scopus citations
2016

Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin

Liao, K., Zhao, Z., Doupe, A. & Ahn, G-J., Jun 8 2016, Proceedings of the 2016 APWG Symposium on Electronic Crime Research, eCrime 2016. IEEE Computer Society, p. 1-13 13 p. 7487938. (eCrime Researchers Summit, eCrime; vol. 2016-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations

Checking intent-based communication in android with intent space analysis

Jing, Y., Ahn, G-J., Doupe, A. & Yi, J. H., May 30 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 735-746 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

dbling: Identifying extensions installed on encrypted web thin clients

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Aug 7 2016, In : Digital Investigation. 18, p. S55-S65

Research output: Contribution to journalArticle

1 Scopus citations

DBling: Identifying extensions installed on encrypted web thin clients

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G. J., Jan 1 2016, p. S55-S65.

Research output: Contribution to conferencePaper

Open Access

HoneyMix: Toward SDN-based intelligent honeynet

Han, W., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 11 2016, SDN-NFV Security 2016 - Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 1-6 6 p. (SDN-NFV Security 2016 - Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Moving target defense for Web applications using Bayesian Stackelberg games

Vadlamud, S. G., Sengupta, S., Taguinod, M., Zhao, Z., Doupe, A., Ahn, G-J. & Kambhampati, S., 2016, AAMAS 2016 - Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1377-1378 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Position paper: Towards a moving target defense approach for attribute-based access control

Rubio-Medrano, C. E., Lamp, J., Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G-J., Mar 11 2016, ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 68-71 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ransomware and cryptocurrency Partners in crime

Ahn, G-J., Doupe, A., Zhao, Z. & Liao, K., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 105-126 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Scopus citations

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam

Tu, H., Doupe, A., Zhao, Z. & Ahn, G-J., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 320-338 19 p. 7546510. (Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

State-Aware network access management for software-defined networks

Han, W., Hu, H., Zhao, Z., Doupe, A., Ahn, G-J., Wang, K. C. & Deng, J., Jun 6 2016, SACMAT 2016 - Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 1-11 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. 06-08-June-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Target Fragmentation in Android Apps

Mutchler, P., Safaei, Y., Doupe, A. & Mitchell, J., Aug 1 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., p. 204-213 10 p. 7527771

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations
2015

Federated access management for collaborative network environments: Framework and case study

Rubio-Medrano, C. E., Zhao, Z., Doupe, A. & Ahn, G-J., Jun 1 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. Association for Computing Machinery, Vol. 2015-June. p. 125-134 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Toward a Moving Target Defense for Web Applications

Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G-J., Oct 19 2015, Proceedings - 2015 IEEE 16th International Conference on Information Reuse and Integration, IRI 2015. Institute of Electrical and Electronics Engineers Inc., p. 510-517 8 p. 7301020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations
2014

Do you feel lucky? A large-scale analysis of risk-rewards trade-offs in cyber security

Shoshitaishvili, Y., Invernizzi, L., Doupe, A. & Vigna, G., Jan 1 2014, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014. Association for Computing Machinery, p. 1649-1656 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations
2013

DeDacota: Toward preventing server-side XSS via automatic code and data separation

Doupé, A., Cui, W., Jakubowski, M. H., Peinado, M., Kruegel, C. & Vigna, G., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1205-1216 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Scopus citations

EARs in the wild: Large-scale analysis of Execution After Redirect Vulnerabilities

Payet, P., Doupé, A., Kruegel, C. & Vigna, G., May 27 2013, 28th Annual ACM Symposium on Applied Computing, SAC 2013. p. 1792-1799 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Writing groups in computer science research labs

Doupé, A. & Kayfetz, J. L., Dec 1 2013, 2013 Frontiers in Education Conference: Energizing the Future, FIE 2013 - Proceedings. p. 1359-1365 7 p. 6685054. (Proceedings - Frontiers in Education Conference, FIE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2012

Enemy of the state: A state-aware black-box web vulnerability scanner

Doupé, A., Cavedon, L., Kruegel, C. & Vigna, G., Jan 1 2012, p. 523-538. 16 p.

Research output: Contribution to conferencePaper

2011

Fear the EAR: Discovering and mitigating execution after redirect vulnerabilities

Doupé, A., Boe, B., Kruegel, C. & Vigna, G., Nov 14 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 251-261 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations

Hit 'em where it hurts: A live security exercise on Cyber Situational Awareness

Doupé, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., Cavedon, L. & Vigna, G., Dec 1 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 51-61 11 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations
2010

Why Johnny can't pentest: An analysis of black-box web vulnerability scanners

Doupé, A., Cova, M. & Vigna, G., Aug 3 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 111-131 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

97 Scopus citations