Name
Affiliation
Papers
WILLIAM ROBERTSON
Northeastern University Boston
92
Collaborators
Citations 
PageRank 
86
1762
123.11
Referers 
Referees 
References 
4162
2057
1157
Search Limit
1001000
Title
Citations
PageRank
Year
MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys00.342022
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing00.342022
DICE - Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.00.342021
Clustering and the Weekend Effect - Recommendations for the Use of Top Domain Lists in Security Research.00.342019
A Longitudinal Analysis of the ads.txt Standard00.342019
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.220.782018
How Tracking Companies Circumvented Ad Blockers Using WebSockets.00.342018
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions.20.362018
Eraser: Your Data Won't Be Back00.342018
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop.00.342018
Surveylance: Automatically Detecting Online Survey Scams30.402018
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas?10.362018
Large-Scale Analysis of Style Injection by Relative Path Overwrite.00.342018
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads130.712018
On The Misuse Of Graphical User Interface Elements To Implement Security Controls00.342017
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications.20.372017
Game Of Registrars: An Empirical Analysis Of Post-Expiration Domain Name Takeovers20.362017
Ex-Ray: Detection of History-Leaking Browser Extensions.70.472017
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.60.412016
Unveil: A Large-Scale, Automated Approach To Detecting Ransomware321.812016
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.10.372016
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes.00.342016
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems20.372016
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails20.362016
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities.30.402016
TriggerScope: Towards Detecting Logic Bombs in Android Applications290.802016
LAVA: Large-Scale Automated Vulnerability Addition351.202016
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users60.412015
Cutting the gordian knot: A look under the hood of ransomware attacks573.022015
SLA-Based Time-Aware Provisioning Mechanisms in Shared Mesh Protected Optical Networks.00.342015
SENTINEL: Securing Legacy Firefox Extensions.30.422015
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities70.542015
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications.10.362015
Zeqos: A New Energy And Qos-Aware Routing Protocol For Communication Of Sensor Devices In Healthcare System100.492014
VirtualSwindle: an automated attack against in-app billing on android130.682014
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces30.392014
TrueClick: automatically distinguishing trick banners from genuine download links.50.422014
Optical Delusions: A Study of Malicious QR Codes in the Wild90.682014
Why Is CSP Failing? Trends and Challenges in CSP Adoption.221.142014
Scalable Approach To Dynamic Sla Negotiation Mechanism In Protected Shared Mesh Optical Networks20.402013
Enhanced Adaptive SLA-aware Algorithms for Provisioning Shared Mesh Optical Networks.00.342013
Securing legacy firefox extensions with SENTINEL70.472013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks512.412013
PatchDroid: scalable third-party security patches for Android devices220.712013
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.160.862013
A dual-mode energy efficient encryption protocol for wireless sensor networks00.342013
PrivExec: Private Execution as an Operating System Service170.642013
SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives20.392013
Holiday Pictures Or Blockbuster Movies? Insights Into Copyright Infringement In User Uploads To One-Click File Hosters40.462013
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis772.682012
  • 1
  • 2