Adam Oest
Orcid: 0000-0002-4313-3714
According to our database1,
Adam Oest
authored at least 26 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Commun. Mag., September, 2023
Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures.
IEEE Internet Things J., July, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Secur. Priv., 2022
IEEE Secur. Priv., 2022
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
2019
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018
2013
Student development of board game strategies in a web-based graphical infrastructure (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
2012
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012