What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Marie Vasek
Google Scholar
ORCID:
0009-0009-4045-9493
17
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
SoK: A Privacy Framework for Security Research Using Social Media Data.
Kyle Beadle
Kieron Ivy Turk
Aliai Eusebi
Mindy Tran
Marilyne Ordekian
Enrico Mariconti
Yixin Zou
Marie Vasek
2025
conf/uss
'Hey mum, I dropped my phone down the toilet': Investigating Hi Mum and Dad SMS Scams in the United Kingdom.
Sharad Agarwal
Emma Harvey
Enrico Mariconti
Guillermo Suarez-Tangil
Marie Vasek
2023
conf/fc
Short Paper: DeFi Deception - Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects.
Sharad Agarwal
Gilberto Atondo Siu
Marilyne Ordekian
Alice Hutchings
Enrico Mariconti
Marie Vasek
2023
conf/fc
Shaping Cryptocurrency Gatekeepers with a Regulatory "Trial and Error".
Marilyne Ordekian
Ingolf Becker
Marie Vasek
2022
conf/eurosp
Investigating the concentration of High Yield Investment Programs in the United Kingdom.
Sharad Agarwal
Marie Vasek
2022
conf/eurosp
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains.
Aliai Eusebi
Marie Vasek
Ella Cockbain
Enrico Mariconti
2021
conf/ccs
Analyzing Target-Based Cryptocurrency Pump and Dump Schemes.
J. T. Hamrick
Farhang Rouhi
Arghya Mukherjee
Marie Vasek
Tyler Moore
Neil Gandal
2021
conf/icbc2
Detecting Text Reuse in Cryptocurrency Whitepapers.
Andrew Morin
Marie Vasek
Tyler Moore
2020
conf/eurosp
WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020.
Luca Allodi
Alice Hutchings
Fabio Massacci
Sergio Pastrana
Marie Vasek
2018
conf/fc
Analyzing the Bitcoin Ponzi Scheme Ecosystem.
Marie Vasek
Tyler Moore
2016
conf/ccs
Measuring the Impact of Sharing Abuse Data with Web Hosting Providers.
Marie Vasek
Matthew Weeden
Tyler Moore
2016
conf/fc
The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets.
Marie Vasek
Joseph Bonneau
Ryan Castellucci
Cameron Keith
Tyler Moore
2015
conf/fc
There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams.
Marie Vasek
Tyler Moore
2014
conf/fc
Identifying Risk Factors for Webserver Compromise.
Marie Vasek
Tyler Moore
2014
conf/fc
Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem.
Marie Vasek
Micah Thornton
Tyler Moore
2014
conf/fc
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools.
Benjamin Johnson
Aron Laszka
Jens Grossklags
Marie Vasek
Tyler Moore
2012
conf/uss
Do Malware Reports Expedite Cleanup? An Experimental Study.
Marie Vasek
Tyler Moore
Coauthors
Aliai Eusebi
(2)
Alice Hutchings
(2)
Andrew Morin
(1)
Arghya Mukherjee
(1)
Aron Laszka
(1)
Benjamin Johnson
(1)
Cameron Keith
(1)
Ella Cockbain
(1)
Emma Harvey
(1)
Enrico Mariconti
(4)
Fabio Massacci
(1)
Farhang Rouhi
(1)
Gilberto Atondo Siu
(1)
Guillermo Suarez-Tangil
(1)
Ingolf Becker
(1)
J. T. Hamrick
(1)
Jens Grossklags
(1)
Joseph Bonneau
(1)
Kieron Ivy Turk
(1)
Kyle Beadle
(1)
Luca Allodi
(1)
Marie Vasek
(17)
Marilyne Ordekian
(3)
Matthew Weeden
(1)
Micah Thornton
(1)
Mindy Tran
(1)
Neil Gandal
(1)
Ryan Castellucci
(1)
Sergio Pastrana
(1)
Sharad Agarwal
(3)
Tyler Moore
(10)
Yixin Zou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to