Kevin Borgolte
Orcid: 0000-0001-7427-7852
According to our database1,
Kevin Borgolte
authored at least 32 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions.
Gov. Inf. Q., October, 2023
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2021
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021
Proceedings of the HotNets '21: The 20th ACM Workshop on Hot Topics in Networks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Encryption without centralization: distributing DNS queries across recursive resolvers.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021
2020
CoRR, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Understanding the Performance Costs and Benefits of Privacy-focused Browser Extensions.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020
2019
Proceedings of the Applied Networking Research Workshop, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
2015
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications.
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines.
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 2014 USENIX Summit on Gaming, 2014
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013