Data breaches, phishing, or malware? Understanding the risks of stolen credentials |
ACM CCS 2017
|
Tracking Ransomware End to End |
Black Hat USA 2017
|
Cloak of Visibility: Detecting When Machines Browse a Different Web |
37th IEEE Symposium on Security and Privacy
|