Local Frames: Exploiting Inherited Origins to Bypass Content Blockers, Alisha Ukani, Hamed Haddadi, Alex C. Snoeren, and Peter Snyder,
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Taipei, Taiwan, October 2025.
Somesite I Used To Crawl: Awareness, Agency and Efficacy in Protecting Content Creators From AI Crawlers, Enze Liu, Elisa Luo, Shawn Shan, Geoffrey M. Voelker, Ben Y. Zhao, and Stefan Savage,
Proceedings of the ACM Internet Measurement Conference (IMC), Madison, Wisconsin, October 2025.
Characterizing the MrDeepFakes Sexual Deepfake Marketplace, Catherine Han, Anne Li, Deepak Kumar, and Zakir Durumeric,
Proceedings of the USENIX Security Symposium, Seattle, WA, August 2025.
From Scarcity to Opportunity: Examining Abuse of the IPv4 Leasing Market, Bernhard Degen, Ben Du, Ricky K. P. Mok, Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, and kc claffy.,
Proceedings of the 6th Network Traffic Measurement and Analysis Conference (TMA), June 2025.
Understanding the Efficacy of Phishing Training in Practice, Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of the IEEE Symposium on Security and Privacy, May 2025.
Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters, Mihir Bellare, Doreen Riepel, and Laura Shea,
Proceedings of PKC 2025, May 2025.
Public-Algorithm Substitution Attacks: Subverting Hashing and Verification, Mihir Bellare, Doreen Riepel, and Laura Shea,
Proceedings of PKC 2025, May 2025.
An Empirical Analysis on the Use and Reporting of National Security Letters, Alex Bellon, Miro Haller, Andrey Labunets, Enze Liu, and Stefan Savage,
Proceedings of ACM Sympoisum on Computer Science and Law (CSLAW), Munich, Germany, March 2025.
Characterizing the Networks Sending Enterprise Phishing Emails, Elisa Luo, Liane Young, Grant Ho, M. H. Afifi, Marco Schweighauser, Ethan Katz-Bassett, and Asaf Cidon,
Proceedings of the Passive and Active Measurement Conference (PAM), Virtual, March 2025.
On the Semidirect Discrete Logarithm Problem in Finite Groups, Christopher Battarbee, Giacomo Borin, Ryann Cartor, Nadia Heninger, David Jao, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, and Rainer Steinwandt,
Proceedings of Asiacrypt 2024, Kolkata, India, December 2024.
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs, Mihir Bellare, Rishabh Ranjan, Doreen Riepel, and Ali Aldakheel,
Proceedings of Asiacrypt 2024, Kolkata, India, December 2024.
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange, Mihir Bellare, Doreen Riepel, Stefano Tessaro, and Yizhao Zhang,
Proceedings of Asiacrypt 2024, Kolkata, India, December 2024.
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption, Mihir Bellare and Anna Lysyanskaya,
IACR Journal of Cryptology 37(4), December 2024.
Succinctly-Committing Authenticated Encryption, Mihir Bellare and Biet Tung Hoang,
Proceedings of Crypto 2024, Santa Barbara, CA, August 2024.
Give and Take: An End-To-End Investigation of Giveaway Scam
Conversion Rates, Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, and Sarah Meiklejohn,
Proceedings of the ACM Internet Measurement Conference (IMC), Madrid, Spain, November 2024.
Sublet Your Subnet: Inferring IP Leasing in the Wild, Ben Du, Romain Fontugne, Cecilia Testart, Alex C. Snoeren, and kc Claffy,
Proceedings of the ACM Internet Measurement Conference (IMC), Madrid, Spain, November 2024.
RADIUS/UDP Considered Harmful, Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl,
Proceedings of the USENIX Security Symposium, Philadelphia, PA, August 2024.
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem, Gabrielle Beck, Harry Eldridge, Matthew Green, Nadia Heninger, and Abhishek Jain,
Proceedings of the USENIX Security Symposium, Philadelphia, PA, August 2024.
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild, Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, and Liz Izhikevich,
Proceedings of the IEEE European Symposium on Security and Privacy, Vienna, Austria, July 2024.
PressProtect: Helping Journalists Navigate Social Media in the Face of Online Harassment, Catherine Han, Anne Li, Deepak Kumar, and Zakir Durumeric,
Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing, October 2024.
Scalable Metadata-Hiding for Privacy Preserving IoT Systems, Yunang Chen, David Heath, Rahul Chatterjee, and Earlence Fernandes,
Proceedings on Privacy Enhanding Technologies Symposium, Bristol, UK, July 2024.
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles, Maryam Motallebighomi, Earlence Fernandes, and Aanjhan Ranganathan,
Proceedings of the USENIX WOOT Conference on Offensive Technologies (WOOT), Philadelphia, PA, August 2024.
Stateful Least Privilege Authorization for the Cloud, Leo Cao, Luoxi Meng, Deian Stefan, and Earlence Fernandes,
Proceedings of the USENIX Security Symposium, Philadelphia, PA, August 2024.