关注
Grant Ho
Grant Ho
在 eng.ucsd.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Smart locks: Lessons for securing commodity internet of things devices
G Ho, D Leung, P Mishra, A Hosseini, D Song, D Wagner
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
3562016
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1572015
Detecting credential spearphishing in enterprise settings
G Ho, A Sharma, M Javed, V Paxson, D Wagner
26th USENIX security symposium (USENIX security 17), 469-485, 2017
1492017
Detecting and characterizing lateral phishing at scale
G Ho, A Cidon, L Gavish, M Schweighauser, V Paxson, S Savage, ...
28th USENIX security symposium (USENIX security 19), 1273-1290, 2019
1092019
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
772016
Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics
G Ho
Technicalreport, StanfordUniversity 73, 74, 2014
402014
Driving {2FA} Adoption at Scale: Optimizing {Two-Factor} Authentication Notification Design Patterns
M Golla, G Ho, M Lohmus, M Pulluri, EM Redmiles
30th USENIX Security Symposium (USENIX Security 21), 109-126, 2021
392021
Hopper: Modeling and detecting lateral movement
G Ho, M Dhiman, D Akhawe, V Paxson, S Savage, GM Voelker, D Wagner
30th USENIX Security Symposium (USENIX Security 21), 3093-3110, 2021
282021
Tick tock: building browser red pills from timing side channels
G Ho, D Boneh, L Ballard, N Provos
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
242014
No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps
E Liu, S Rao, S Havron, G Ho, S Savage, GM Voelker, D McCoy
Proceedings on Privacy Enhancing Technologies, 2023
132023
Forward pass: On the security implications of email forwarding mechanism and policy
E Liu, G Akiwate, M Jonker, A Mirian, G Ho, GM Voelker, S Savage
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 373-391, 2023
52023
Understanding the viability of gmail's origin indicator for identifying the sender
E Liu, L Sun, A Bellon, G Ho, GM Voelker, S Savage, INS Munyaka
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 77-95, 2023
22023
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts
N Shah, G Ho, M Schweighauser, M Ibrahim, A Cidon, D Wagner
Deployable Machine Learning for Security Defense: First International …, 2020
22020
Unfiltered: Measuring Cloud-based Email Filtering Bypasses
S Rao, E Liu, G Ho, GM Voelker, S Savage
Proceedings of the ACM on Web Conference 2024, 1702-1711, 2024
2024
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates
M Ariana, H Grant, S Stefan, V Geoffrey M
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
2023
Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights
G Ho
University of California, Berkeley, 2020
2020
ware Apps
E Liu, G Ho
系统目前无法执行此操作,请稍后再试。
文章 1–17