Author of the publication

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.

, , , , , , , , , , , and . CCS, page 3165-3179. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 413-430. USENIX Association, (2022)Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2021)Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization., , , , , , and . NDSS, The Internet Society, (2020)RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections., , , , , , , and . CCS, page 3093-3107. ACM, (2023)MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts., , , , , , and . HICSS, page 1-10. ScholarSpace, (2021)Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation., , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry., , , , , , , and . AsiaCCS, ACM, (2024)CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing., , , , , , , , , and 3 other author(s). SP, page 1109-1124. IEEE, (2021)Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)., , , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 117-146. Springer, (2021)Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem., , , , , , , , and . CODASPY, page 55-65. ACM, (2024)