Kaan Onarlioglu

Orcid: 0009-0003-7832-5884

According to our database1, Kaan Onarlioglu authored at least 26 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Untangle: Multi-Layer Web Server Fingerprinting.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
OAuth 2.0 Redirect URI Validation Falls Short, Literally.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Web Cache Deception Escalates!
Proceedings of the 31st USENIX Security Symposium, 2022

FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
T-Reqs: HTTP Request Smuggling with Differential Fuzzing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

FADE: Detecting Fake News Articles on the Web.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Cached and Confused: Web Cache Deception in the Wild.
Proceedings of the 29th USENIX Security Symposium, 2020

2018
Eraser: Your Data Won't Be Back.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Trellis: Privilege Separation for Multi-user Applications Made Easy.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
SENTINEL: Securing Legacy Firefox Extensions.
Comput. Secur., 2015

BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Toward Robust Hidden Volumes using Write-Only Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

TrueClick: automatically distinguishing trick banners from genuine download links.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
PrivExec: Private Execution as an Operating System Service.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Securing Legacy Firefox Extensions with SENTINEL.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Insights into User Behavior in Dealing with Internet Attacks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2010
Efficient broadcast encryption with user profiles.
Inf. Sci., 2010

G-Free: defeating return-oriented programming through gadget-less binaries.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010


  Loading...