Tracking ransomware end-to-end DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ... 2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018 | 254 | 2018 |
Reading the tea leaves: A comparative analysis of threat intelligence VG Li, M Dunn, P Pearce, D McCoy, GM Voelker, S Savage 28th USENIX security symposium (USENIX Security 19), 851-867, 2019 | 133 | 2019 |
How they did it: An analysis of emission defeat devices in modern automobiles M Contag, G Li, A Pawlowski, F Domke, K Levchenko, T Holz, S Savage 2017 IEEE Symposium on Security and Privacy (SP), 231-250, 2017 | 70 | 2017 |
Clairvoyance: Inferring blocklist use on the internet VG Li, G Akiwate, K Levchenko, GM Voelker, S Savage Passive and Active Measurement: 22nd International Conference, PAM 2021 …, 2021 | 8 | 2021 |
An empirical analysis on threat intelligence: Data characteristics and real-world uses G Li University of California, San Diego, 2020 | 6 | 2020 |