Adam Doupé
Orcid: 0000-0003-2634-3901Affiliations:
- Arizona State University
According to our database1,
Adam Doupé
authored at least 99 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
"I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services.
Proceedings of the 33rd USENIX Security Symposium, 2024
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation.
Proceedings of the 32nd USENIX Security Symposium, 2023
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Secur. Priv., 2022
Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Proceedings of the 31st USENIX Security Symposium, 2022
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention.
Proceedings of the 31st USENIX Security Symposium, 2022
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Proceedings of the 29th USENIX Security Symposium, 2020
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting.
Proceedings of the 28th USENIX Security Symposium, 2019
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Commun. Stand. Mag., 2017
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
2016
Digit. Investig., 2016
CoRR, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation.
Proceedings of the 2016 ITU Kaleidoscope: ICTs for a Sustainable World, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
2015
Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
2014
Proceedings of the 2014 USENIX Summit on Gaming, 2014
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security.
Proceedings of the Symposium on Applied Computing, 2014
2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the IEEE Frontiers in Education Conference, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Detection of Intrusions and Malware, 2010