Comparative analysis of control plane security of SDN and conventional networks AR Abdou, PC Van Oorschot, T Wan IEEE Communications Surveys & Tutorials 20 (4), 3542-3559, 2018 | 111 | 2018 |
CPV: Delay-based location verification for the Internet AR Abdou, A Matrawy, PC van Oorschot IEEE Transactions on Dependable and Secure Computing 14 (2), 130-144, 2017 | 40 | 2017 |
What lies beneath? Analyzing automated SSH bruteforce attacks AR Abdou, D Barrera, PC van Oorschot International conference on PASSWORDS, 72-91, 2015 | 37 | 2015 |
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband M Singh, P Leu, AR Abdou, S Capkun USENIX Security Symposium, 2019 | 35 | 2019 |
SoK: Delegation and Revocation, the Missing Links in the Web’s Chain of Trust L Chuat, A Abdou, R Sasse, C Sprenger, D Basin, A Perrig IEEE European Symposium on Security & Privacy (EuroS&P 2020), 2020 | 29 | 2020 |
Accurate One-Way Delay Estimation with Reduced Client-Trustworthiness AR Abdou, A Matrawy, PC van Oorschot IEEE Communications Letter 19 (5), 2015 | 29 | 2015 |
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols E Ulqinaku, H Assal, AR Abdou, S Chiasson, S Capkun USENIX Security Symposium, 2021 | 28* | 2021 |
Accurate manipulation of delay-based Internet geolocation AR Abdou, A Matrawy, PC van Oorschot Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 23 | 2017 |
Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication AR Abdou, PC van Oorschot ACM TOPS 21 (1), 1:1-1:26, 2018 | 17 | 2018 |
A framework and comparative analysis of control plane security of SDN and conventional networks AR Abdou, PC van Oorschot, T Wan arXiv preprint arXiv:1703.06992, 2017 | 16 | 2017 |
Location verification on the Internet: Towards enforcing Location-aware access policies over Internet clients AR Abdou, A Matrawy, PC Van Oorschot Communications and Network Security (CNS), 2014 IEEE Conference on, 175-183, 2014 | 15 | 2014 |
Taxing the Queue: Hindering Middleboxes from Unauthorized Large-Scale Traffic Relaying AR Abdou, A Matrawy, PC van Oorschot IEEE Communications Letter 19 (1), 2015 | 12 | 2015 |
Empirical Scanning Analysis of Censys and Shodan C Bennett, A Abdou, PC van Orschot NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb 2021), 2021 | 10 | 2021 |
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes F Alaca, AR Abdou, PC van Oorschot IEEE TDSC 12 (2), 534-549, 2021 | 9 | 2021 |
Comparative Analysis of DoT and HTTPS Certificate Ecosystems A Jahromi, A Abdou NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb 2021), 2021 | 6 | 2021 |
Secure Client and Server Geolocation Over the Internet AR Abdou, PC van Oorschot USENIX ;login:, 2018 | 5 | 2018 |
Characterizing the Adoption of Security.txt Files and their Applications to Vulnerability Notification W Findlay, AR Abdou NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb 2022), 2022 | 3 | 2022 |
Location Verification of Wireless Internet Clients: Evaluation and Improvements AR Abdou, A Matrawy, PC Van Oorschot IEEE Transactions on Emerging Topics in Computing 5 (4), 563-575, 2017 | 3 | 2017 |
Why do internet devices remain vulnerable? a survey with system administrators T Bondar, H Assal, AR Abdou NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb 2023)., 2023 | 2 | 2023 |
Position paper: Certificate root stores—an area of unity or disparity? J Purushothaman, E Thompson, AR Abdou Proceedings of the 15th Workshop on Cyber Security Experimentation and Test …, 2022 | 2 | 2022 |