Grant Ho

Orcid: 0009-0002-4216-951X

According to our database1, Grant Ho authored at least 17 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unfiltered: Measuring Cloud-based Email Filtering Bypasses.
Proceedings of the ACM on Web Conference 2024, 2024

2023
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps.
Proc. Priv. Enhancing Technol., January, 2023

Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

An Empirical Analysis of Enterprise-Wide Mandatory Password Updates.
Proceedings of the Annual Computer Security Applications Conference, 2023

2021
Hopper: Modeling and Detecting Lateral Movement (Extended Report).
CoRR, 2021

Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium, 2021

Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights.
PhD thesis, 2020

A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts.
CoRR, 2020

2019
Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of the 28th USENIX Security Symposium, 2019

2017
Detecting Credential Spearphishing in Enterprise Settings.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the 25th International Conference on World Wide Web, 2016

Smart Locks: Lessons for Securing Commodity Internet of Things Devices.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Tick Tock: Building Browser Red Pills from Timing Side Channels.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

1998
Improved lost frame recovery techniques for ITU-T G.723.1 speech coding system.
Proceedings of the 9th European Signal Processing Conference, 1998


  Loading...