What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Grant Ho
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Understanding the Efficacy of Phishing Training in Practice.
Grant Ho
Ariana Mirian
Elisa Luo
Khang Tong
Euyhyun Lee
Lin Liu
Christopher A. Longhurst
Christian Dameff
Stefan Savage
Geoffrey M. Voelker
2025
conf/uss
A First Look at Governments' Enterprise Security Guidance.
Kimberly Ruth
Raymond Buernor Obu
Ifeoluwa Shode
Gavin Li
Carrie Gates
Grant Ho
Zakir Durumeric
2023
journals/popets
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps.
Enze Liu
Sumanth Rao
Sam Havron
Grant Ho
Stefan Savage
Geoffrey M. Voelker
Damon McCoy
2023
conf/soups
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.
Enze Liu
Lu Sun
Alex Bellon
Grant Ho
Geoffrey M. Voelker
Stefan Savage
Imani N. S. Munyaka
2023
conf/eurosp
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy.
Enze Liu
Gautam Akiwate
Mattijs Jonker
Ariana Mirian
Grant Ho
Geoffrey M. Voelker
Stefan Savage
2023
conf/acsac
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates.
Ariana Mirian
Grant Ho
Stefan Savage
Geoffrey M. Voelker
2021
conf/uss
Hopper: Modeling and Detecting Lateral Movement.
Grant Ho
Mayank Dhiman
Devdatta Akhawe
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2021
conf/uss
Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns.
Maximilian Golla
Grant Ho
Marika Lohmus
Monica Pulluri
Elissa M. Redmiles
2019
conf/uss
Detecting and Characterizing Lateral Phishing at Scale.
Grant Ho
Asaf Cidon
Lior Gavish
Marco Schweighauser
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2017
conf/uss
Detecting Credential Spearphishing in Enterprise Settings.
Grant Ho
Aashish Sharma
Mobin Javed
Vern Paxson
David A. Wagner
2016
conf/ccs
Smart Locks: Lessons for Securing Commodity Internet of Things Devices.
Grant Ho
Derek Leung
Pratyush Mishra
Ashkan Hosseini
Dawn Song
David A. Wagner
2015
conf/sp
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Kurt Thomas
Elie Bursztein
Chris Grier
Grant Ho
Nav Jagpal
Alexandros Kapravelos
Damon McCoy
Antonio Nappa
Vern Paxson
Paul Pearce
Niels Provos
Moheeb Abu Rajab
Coauthors
Aashish Sharma
(1)
Alex Bellon
(1)
Alexandros Kapravelos
(1)
Antonio Nappa
(1)
Ariana Mirian
(3)
Asaf Cidon
(1)
Ashkan Hosseini
(1)
Carrie Gates
(1)
Chris Grier
(1)
Christian Dameff
(1)
Christopher A. Longhurst
(1)
Damon McCoy
(2)
David A. Wagner
(4)
Dawn Song
(1)
Derek Leung
(1)
Devdatta Akhawe
(1)
Elie Bursztein
(1)
Elisa Luo
(1)
Elissa M. Redmiles
(1)
Enze Liu
(3)
Euyhyun Lee
(1)
Gautam Akiwate
(1)
Gavin Li
(1)
Geoffrey M. Voelker
(7)
Grant Ho
(12)
Ifeoluwa Shode
(1)
Imani N. S. Munyaka
(1)
Khang Tong
(1)
Kimberly Ruth
(1)
Kurt Thomas
(1)
Lin Liu
(1)
Lior Gavish
(1)
Lu Sun
(1)
Marco Schweighauser
(1)
Marika Lohmus
(1)
Mattijs Jonker
(1)
Maximilian Golla
(1)
Mayank Dhiman
(1)
Mobin Javed
(1)
Moheeb Abu Rajab
(1)
Monica Pulluri
(1)
Nav Jagpal
(1)
Niels Provos
(1)
Paul Pearce
(1)
Pratyush Mishra
(1)
Raymond Buernor Obu
(1)
Sam Havron
(1)
Stefan Savage
(7)
Sumanth Rao
(1)
Vern Paxson
(4)
Zakir Durumeric
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to