Accurate Real-Time Labeling of Application Traffic2022 IEEE 47th Conference on Local Computer Networks (LCN)SCOUT
DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On2022 ACM SIGSAC Conference on Computer and Communications SecuritySES
We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session TicketsUSENIX Security’23SEAN
Content-Type: multipart/oracle – Tapping into Format Oracles in Email End-to-End EncryptionUSENIX Security’23SEAN
Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML SignaturesUSENIX Security’23
Behind the Screens: The Security & Privacy Advice Landscape of Children in Grades 5 & 6WiPSCE’23SCOUT
Assessing the Security and Privacy of Baby Monitor AppsJournal of Cybersecurity and PrivacyMedMax
Improving trace synthesis by utilizing computer vision for user action emulationForensic Science International: Digital InvestigationMedMax
Security Analysis of the 3MF Data FormatRAID’23