William K. Robertson
Orcid: 0000-0002-6968-0273Affiliations:
- Northeastern University, Boston, MA, USA
- University of California, Santa Barbara, USA
According to our database1,
William K. Robertson
authored at least 88 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Secur. Priv., 2024
2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
ACM Trans. Priv. Secur., 2022
MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019
Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists.
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Internet Measurement Conference, 2019
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IEEE Secur. Priv., 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop.
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
it Inf. Technol., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes.
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
2014
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
An empirical analysis of input validation mechanisms in web applications and languages.
Proceedings of the ACM Symposium on Applied Computing, 2012
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2010
IEEE Trans. Software Eng., 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
2009
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries.
J. Comput. Secur., 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
2008
Are your votes <i>really</i> counted?: testing the security of real-world electronic voting systems.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008
2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2006
2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
2004
Prax. Inf.verarb. Kommun., 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003