Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda The Conference on Detection of Intrusions and Malware & Vulnerability …, 2015 | 599 | 2015 |
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware A Kharraz, S Arshad, C Mulliner, W Robertson, E Kirda The 25th USENIX Security Symposium, 2016 | 528 | 2016 |
Redemption: Real-time Protection Against Ransomware at End-Hosts A Kharraz, E Kirda The 20th International Symposium on Research in Attacks, Intrusions and …, 2017 | 155 | 2017 |
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ... The Web Conference 2019 (WWW'19), 2019 | 109 | 2019 |
Surveylance: Automatically Detecting Online Survey Scams A Kharraz, W Robertson, E Kirda The Proceedings of the IEEE Symposium on Security & Privacy, May 2018, 2018 | 90 | 2018 |
Optical Delusions: A Study of Malicious QR Codes in the Wild A Kharraz, E Kirda, W Robertson, D Balzarotti, A Francillon 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 62 | 2014 |
An automated approach to detecting ransomware E Kirda, W Robertson, A Kharraz 25th International Conference on Software Analysis, Evolution, 1-1, 2017 | 50* | 2017 |
UNVEIL: a large-scale, automated approach to detecting ransomware E Kirda, A Kharraz 2017 IEEE 24th International Conference on Software Analysis, Evolution and …, 2017 | 50 | 2017 |
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions S Arshad, A Kharraz, W Robertson 20th International Conference of Financial Cryptography and Data Security …, 2016 | 49 | 2016 |
Protecting Against Ransomware: A New Line of Research or Restating Classic Ideas? A Kharraz, W Robertson, E Kirda IEEE Security & Privacy, 2018 | 46 | 2018 |
On-demand multicast routing protocol with efficient route discovery A Kharraz, H Sarbazi-Azad, A Zomaya Journal of Network and Computer Applications 35 (3), 942-950, 2012 | 44 | 2012 |
WebSocket Adoption and the Landscape of the Real-Time Web P Murley, Z Ma, J Mason, M Bailey, A Kharraz The Web Conference 2021 (WWW'21), 2021 | 34 | 2021 |
Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance S Arshad, A Kharraz, W Robertson The 19th International Symposium on Research in Attacks, Intrusions and …, 2016 | 31 | 2016 |
Preventing Server-Side Request Forgery Attacks EK Bahruz Jabiyev, Omid Mirzaei, Amin Kharraz 36th ACM Symposium on Applied Computing (SAC 2021), 2021 | 22* | 2021 |
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning O Mirzaei, R Vasilenko, E Kirda, L Lu, A Kharraz The Conference on Detection of Intrusions and Malware & Vulnerability …, 2021 | 11 | 2021 |
You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures T Innocenti, SA Mirheidari, A Kharraz, B Crispo, E Kirda The Conference on Detection of Intrusions and Malware & Vulnerability …, 2021 | 8 | 2021 |
Techniques and Solutions for Addressing Ransomware Attacks A Kharraz Northeastern University, 2017 | 6 | 2017 |
An End-to-End Analysis of Covid-Themed Scams in the Wild B Ousat, MA Tofighi, A Kharraz Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | 4 | 2023 |
USBeSafe: An End-Point Solution to Protect Against USB-Based Attacks A Kharraz, B Daley, G Baker, W Robertson, E Kirda The 22nd International Symposium on Research on Attacks, Intrusions, and …, 2019 | 4 | 2019 |
EnSolver: Uncertainty-aware Captcha solver using deep ensembles DC Hoang, CV Nguyen, A Kharraz UAI Epistemic Uncertainty in Artificial Intelligence, 2023 | 2 | 2023 |