What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Geoffrey M. Voelker
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Understanding the Efficacy of Phishing Training in Practice.
Grant Ho
Ariana Mirian
Elisa Luo
Khang Tong
Euyhyun Lee
Lin Liu
Christopher A. Longhurst
Christian Dameff
Stefan Savage
Geoffrey M. Voelker
2024
conf/eurosp
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild.
Katherine Izhikevich
Geoffrey M. Voelker
Stefan Savage
Liz Izhikevich
2023
journals/popets
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps.
Enze Liu
Sumanth Rao
Sam Havron
Grant Ho
Stefan Savage
Geoffrey M. Voelker
Damon McCoy
2023
conf/uss
In the Line of Fire: Risks of DPI-triggered Data Collection.
Ariana Mirian
Alisha Ukani
Ian D. Foster
Gautam Akiwate
Taner Halicioglu
Cynthia T. Moore
Alex C. Snoeren
Geoffrey M. Voelker
Stefan Savage
2023
conf/soups
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.
Enze Liu
Lu Sun
Alex Bellon
Grant Ho
Geoffrey M. Voelker
Stefan Savage
Imani N. S. Munyaka
2023
conf/eurosp
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy.
Enze Liu
Gautam Akiwate
Mattijs Jonker
Ariana Mirian
Grant Ho
Geoffrey M. Voelker
Stefan Savage
2023
conf/acsac
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates.
Ariana Mirian
Grant Ho
Stefan Savage
Geoffrey M. Voelker
2021
conf/uss
Hopper: Modeling and Detecting Lateral Movement.
Grant Ho
Mayank Dhiman
Devdatta Akhawe
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2019
conf/uss
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence.
Vector Guo Li
Matthew Dunn
Paul Pearce
Damon McCoy
Geoffrey M. Voelker
Stefan Savage
2019
conf/uss
Detecting and Characterizing Lateral Phishing at Scale.
Grant Ho
Asaf Cidon
Lior Gavish
Marco Schweighauser
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2017
conf/uss
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser.
Louis F. DeKoven
Stefan Savage
Geoffrey M. Voelker
Nektarios Leontiadis
2014
conf/ccs
Characterizing Large-Scale Click Fraud in ZeroAccess.
Paul Pearce
Vacha Dave
Chris Grier
Kirill Levchenko
Saikat Guha
Damon McCoy
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2014
conf/ndss
DSpin: Detecting Automatically Spun Content on the Web.
Qing Zhang
David Y. Wang
Geoffrey M. Voelker
2013
conf/ndss
Juice: A Longitudinal Study of an SEO Botnet.
David Y. Wang
Stefan Savage
Geoffrey M. Voelker
2012
conf/ccs
Manufacturing compromise: the emergence of exploit-as-a-service.
Chris Grier
Lucas Ballard
Juan Caballero
Neha Chachra
Christian J. Dietrich
Kirill Levchenko
Panayiotis Mavrommatis
Damon McCoy
Antonio Nappa
Andreas Pitsillidis
Niels Provos
M. Zubair Rafique
Moheeb Abu Rajab
Christian Rossow
Kurt Thomas
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2012
conf/ccs
Priceless: the role of payments in abuse-advertised goods.
Damon McCoy
Hitesh Dharmdasani
Christian Kreibich
Geoffrey M. Voelker
Stefan Savage
2012
conf/uss
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Damon McCoy
Andreas Pitsillidis
Grant Jordan
Nicholas Weaver
Christian Kreibich
Brian Krebs
Geoffrey M. Voelker
Stefan Savage
Kirill Levchenko
2011
conf/ccs
Topic modeling of freelance job postings to monitor web service abuse.
Do-kyum Kim
Marti Motoyama
Geoffrey M. Voelker
Lawrence K. Saul
2011
conf/ccs
Cloak and dagger: dynamics of web search cloaking.
David Y. Wang
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Show Me the Money: Characterizing Spam-advertised Revenue.
Chris Kanich
Nicholas Weaver
Damon McCoy
Tristan Halvorson
Christian Kreibich
Kirill Levchenko
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2011
conf/uss
No Plan Survives Contact: Experience with Cybercrime Measurement.
Chris Kanich
Neha Chachra
Damon McCoy
Chris Grier
David Y. Wang
Marti Motoyama
Kirill Levchenko
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.
Marti Motoyama
Damon McCoy
Kirill Levchenko
Stefan Savage
Geoffrey M. Voelker
2011
conf/sp
Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Kirill Levchenko
Andreas Pitsillidis
Neha Chachra
Brandon Enright
Márk Félegyházi
Chris Grier
Tristan Halvorson
Chris Kanich
Christian Kreibich
He Liu
Damon McCoy
Nicholas Weaver
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2010
conf/uss
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Marti Motoyama
Kirill Levchenko
Chris Kanich
Damon McCoy
Geoffrey M. Voelker
Stefan Savage
2010
conf/ndss
Botnet Judo: Fighting Spam with Itself.
Andreas Pitsillidis
Kirill Levchenko
Christian Kreibich
Chris Kanich
Geoffrey M. Voelker
Vern Paxson
Nicholas Weaver
Stefan Savage
2008
conf/ccs
Spamalytics: an empirical analysis of spam marketing conversion.
Chris Kanich
Christian Kreibich
Kirill Levchenko
Brandon Enright
Geoffrey M. Voelker
Vern Paxson
Stefan Savage
2007
conf/uss
Spamscatter: Characterizing Internet Scam Hosting Infrastructure.
David S. Anderson
Chris Fleizach
Stefan Savage
Geoffrey M. Voelker
2001
conf/uss
Inferring Internet Denial-of-Service Activity.
David Moore
Geoffrey M. Voelker
Stefan Savage
Coauthors
Alex Bellon
(1)
Alex C. Snoeren
(1)
Alisha Ukani
(1)
Andreas Pitsillidis
(4)
Antonio Nappa
(1)
Ariana Mirian
(4)
Asaf Cidon
(1)
Brandon Enright
(2)
Brian Krebs
(1)
Chris Fleizach
(1)
Chris Grier
(4)
Chris Kanich
(6)
Christian Dameff
(1)
Christian J. Dietrich
(1)
Christian Kreibich
(6)
Christian Rossow
(1)
Christopher A. Longhurst
(1)
Cynthia T. Moore
(1)
Damon McCoy
(11)
David A. Wagner
(2)
David Moore
(1)
David S. Anderson
(1)
David Y. Wang
(4)
Devdatta Akhawe
(1)
Do-kyum Kim
(1)
Elisa Luo
(1)
Enze Liu
(3)
Euyhyun Lee
(1)
Gautam Akiwate
(2)
Geoffrey M. Voelker
(28)
Grant Ho
(7)
Grant Jordan
(1)
He Liu
(1)
Hitesh Dharmdasani
(1)
Ian D. Foster
(1)
Imani N. S. Munyaka
(1)
Juan Caballero
(1)
Katherine Izhikevich
(1)
Khang Tong
(1)
Kirill Levchenko
(10)
Kurt Thomas
(1)
Lawrence K. Saul
(1)
Lin Liu
(1)
Lior Gavish
(1)
Liz Izhikevich
(1)
Louis F. DeKoven
(1)
Lu Sun
(1)
Lucas Ballard
(1)
M. Zubair Rafique
(1)
Marco Schweighauser
(1)
Márk Félegyházi
(1)
Marti Motoyama
(4)
Matthew Dunn
(1)
Mattijs Jonker
(1)
Mayank Dhiman
(1)
Moheeb Abu Rajab
(1)
Neha Chachra
(3)
Nektarios Leontiadis
(1)
Nicholas Weaver
(4)
Niels Provos
(1)
Panayiotis Mavrommatis
(1)
Paul Pearce
(2)
Qing Zhang
(1)
Saikat Guha
(1)
Sam Havron
(1)
Stefan Savage
(26)
Sumanth Rao
(1)
Taner Halicioglu
(1)
Tristan Halvorson
(2)
Vacha Dave
(1)
Vector Guo Li
(1)
Vern Paxson
(8)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to