Name
Affiliation
Papers
ADAM DOUPÉ
University of California, Santa Barbara
62
Collaborators
Citations 
PageRank 
140
357
33.14
Referers 
Referees 
References 
997
1052
481
Search Limit
1001000
Title
Citations
PageRank
Year
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability00.342022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing00.342022
Improving Source-Code Representations to Enhance Search-based Software Repair00.342022
Context-Auditor: Context-sensitive Content Injection Mitigation.00.342022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs00.342022
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention00.342022
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing10.382021
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases10.352021
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)00.342021
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem00.342021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service00.342021
Scam Pandemic: How Attackers Exploit Public Fear through Phishing20.392020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.00.342020
Exploring Abstraction Functions in Fuzzing00.342020
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems50.462020
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture00.342020
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications00.342020
iCore - continuous and proactive extrospection on multi-core IoT devices.00.342019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues40.452019
History and Future of Automated Vulnerability Analysis00.342019
Understanding and Predicting Private Interactions in Underground Forums.10.352019
Everyone Is Different: Client-Side Diversification For Defending Against Extension Fingerprinting00.342019
Users Really Do Answer Telephone Scams00.342019
Session details: Session 8A: Web Security 100.342018
Measuring E-mail header injections on the world wide web.20.372018
Challenges, Opportunities and a Framework for Web Environment Forensics.00.342018
AIM-SDN: Attacking Information Mismanagement in SDN-datastores.10.352018
CacheLight: Defeating the CacheKit Attack.00.342018
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.00.342018
Challenges and Preparedness of SDN-based Firewalls.00.342018
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis00.342018
HoneyProxy: Design and implementation of next-generation honeynet via SDN.10.342017
Panel: Trustworthy Data Science.00.342017
Toward Standardization of Authenticated Caller ID Transmission.00.342017
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.00.342017
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.40.422017
Deep Android Malware Detection.381.122017
E-Mail Header Injection Vulnerabilities00.342017
Shell We Play A Game? CTF-as-a-service for Security Education.20.422017
HoneyMix: Toward SDN-based Intelligent Honeynet.70.562016
dbling: Identifying extensions installed on encrypted web thin clients00.342016
Towards Automated Threat Intelligence Fusion10.352016
Target Fragmentation in Android Apps120.562016
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.240.732016
Checking Intent-based Communication in Android with Intent Space Analysis.80.442016
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam120.532016
dbling00.342016
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.00.342016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).10.352016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games.50.542016
  • 1
  • 2