Name
Affiliation
Papers
ENGIN KIRDA
Northeastern University Boston
164
Collaborators
Citations 
PageRank 
217
5386
334.12
Referers 
Referees 
References 
8670
2295
1782
Search Limit
1001000
Title
Citations
PageRank
Year
FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies00.342022
Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment00.342022
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers00.342021
DICE - Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.00.342021
You'Ve Got (A Reset) Mail: A Security Analysis Of Email-Based Password Reset Procedures00.342021
SoK: Cryptojacking Malware10.372021
Kratos: multi-user multi-device-aware access control system for the smart home00.342020
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing10.352020
Usbesafe: An End-Point Solution To Protect Against Usb-Based Attacks00.342019
Clustering and the Weekend Effect - Recommendations for the Use of Top Domain Lists in Security Research.00.342019
A Longitudinal Analysis of the ads.txt Standard00.342019
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.220.782018
How Tracking Companies Circumvented Ad Blockers Using WebSockets.00.342018
Eraser: Your Data Won't Be Back00.342018
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop.00.342018
Surveylance: Automatically Detecting Online Survey Scams30.402018
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas?10.362018
Large-Scale Analysis of Style Injection by Relative Path Overwrite.00.342018
Traffic Measurements for Cyber Security.00.342017
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote)30.432017
On The Misuse Of Graphical User Interface Elements To Implement Security Controls00.342017
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.60.412016
Unveil: A Large-Scale, Automated Approach To Detecting Ransomware321.812016
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.10.372016
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users60.412015
Cutting the gordian knot: A look under the hood of ransomware attacks573.022015
SENTINEL: Securing Legacy Firefox Extensions.30.422015
A look at targeted attacks through the lense of an NGO151.022014
VirtualSwindle: an automated attack against in-app billing on android130.682014
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces30.392014
TrueClick: automatically distinguishing trick banners from genuine download links.50.422014
Optical Delusions: A Study of Malicious QR Codes in the Wild90.682014
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains521.882014
Securing legacy firefox extensions with SENTINEL70.472013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks512.412013
PatchDroid: scalable third-party security patches for Android devices220.712013
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.160.862013
PUBCRAWL: protecting users and businesses from CRAWLers130.662012
Privacy risks in named data networking: what is the cost of performance?301.102012
Paying for piracy? an analysis of one-click hosters' controversial reward schemes40.472012
A survey on automated dynamic malware-analysis techniques and tools2056.552012
NSDI '12 and LEET '12.00.342012
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis772.682012
Insights into User Behavior in Dealing with Internet Attacks.60.532012
A quantitative study of accuracy in system call-based malware detection531.502012
An empirical analysis of input validation mechanisms in web applications and languages60.492012
Quo vadis? a study of the evolution of input validation vulnerabilities in web applications191.302011
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.592.502011
PiOS: Detecting Privacy Leaks in iOS Applications.9712.822011
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.160.972011
  • 1
  • 2