Smart locks: Lessons for securing commodity internet of things devices G Ho, D Leung, P Mishra, A Hosseini, D Song, D Wagner Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 356 | 2016 |
Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 157 | 2015 |
Detecting credential spearphishing in enterprise settings G Ho, A Sharma, M Javed, V Paxson, D Wagner 26th USENIX security symposium (USENIX security 17), 469-485, 2017 | 149 | 2017 |
Detecting and characterizing lateral phishing at scale G Ho, A Cidon, L Gavish, M Schweighauser, V Paxson, S Savage, ... 28th USENIX security symposium (USENIX security 19), 1273-1290, 2019 | 109 | 2019 |
Remedying web hijacking: Notification effectiveness and webmaster comprehension F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016 | 77 | 2016 |
Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics G Ho Technicalreport, StanfordUniversity 73, 74, 2014 | 40 | 2014 |
Driving {2FA} Adoption at Scale: Optimizing {Two-Factor} Authentication Notification Design Patterns M Golla, G Ho, M Lohmus, M Pulluri, EM Redmiles 30th USENIX Security Symposium (USENIX Security 21), 109-126, 2021 | 39 | 2021 |
Hopper: Modeling and detecting lateral movement G Ho, M Dhiman, D Akhawe, V Paxson, S Savage, GM Voelker, D Wagner 30th USENIX Security Symposium (USENIX Security 21), 3093-3110, 2021 | 28 | 2021 |
Tick tock: building browser red pills from timing side channels G Ho, D Boneh, L Ballard, N Provos 8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014 | 24 | 2014 |
No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps E Liu, S Rao, S Havron, G Ho, S Savage, GM Voelker, D McCoy Proceedings on Privacy Enhancing Technologies, 2023 | 13 | 2023 |
Forward pass: On the security implications of email forwarding mechanism and policy E Liu, G Akiwate, M Jonker, A Mirian, G Ho, GM Voelker, S Savage 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 373-391, 2023 | 5 | 2023 |
Understanding the viability of gmail's origin indicator for identifying the sender E Liu, L Sun, A Bellon, G Ho, GM Voelker, S Savage, INS Munyaka Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 77-95, 2023 | 2 | 2023 |
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts N Shah, G Ho, M Schweighauser, M Ibrahim, A Cidon, D Wagner Deployable Machine Learning for Security Defense: First International …, 2020 | 2 | 2020 |
Unfiltered: Measuring Cloud-based Email Filtering Bypasses S Rao, E Liu, G Ho, GM Voelker, S Savage Proceedings of the ACM on Web Conference 2024, 1702-1711, 2024 | | 2024 |
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates M Ariana, H Grant, S Stefan, V Geoffrey M Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |
Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights G Ho University of California, Berkeley, 2020 | | 2020 |
ware Apps E Liu, G Ho | | |