William K. Robertson

Orcid: 0000-0002-6968-0273

Affiliations:
  • Northeastern University, Boston, MA, USA
  • University of California, Santa Barbara, USA


According to our database1, William K. Robertson authored at least 88 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives.
IEEE Secur. Priv., 2024

2023
Black-box Attacks Against Neural Binary Function Detection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

ThreadLock: Native Principal Isolation Through Memory Protection Keys.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
ACM Trans. Priv. Secur., 2022

Attacking Neural Binary Function Detection.
CoRR, 2022

Polytope: Practical Memory Access Control for C++ Applications.
CoRR, 2022

MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2021
Bypassing memory safety mechanisms through speculative control flow hijacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Evaluating Synthetic Bugs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.
CoRR, 2020

Cached and Confused: Web Cache Deception in the Wild.
Proceedings of the 29th USENIX Security Symposium, 2020

What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists.
Proceedings of the Information Security - 22nd International Conference, 2019

A Longitudinal Analysis of the ads.txt Standard.
Proceedings of the Internet Measurement Conference, 2019

It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Speculator: a tool to analyze speculative execution attacks and mitigations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas?
IEEE Secur. Priv., 2018

Large-Scale Analysis of Style Injection by Relative Path Overwrite.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Surveylance: Automatically Detecting Online Survey Scams.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop.
Proceedings of the Internet Measurement Conference 2018, 2018

How Tracking Companies Circumvented Ad Blockers Using WebSockets.
Proceedings of the Internet Measurement Conference 2018, 2018

Eraser: Your Data Won't Be Back.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

On the Effectiveness of Type-based Control Flow Integrity.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
On the misuse of graphical user interface elements to implement security controls.
it Inf. Technol., 2017

Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers.
Proceedings of the 26th USENIX Security Symposium, 2017

Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Ex-Ray: Detection of History-Leaking Browser Extensions.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware.
Proceedings of the 25th USENIX Security Symposium, 2016

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.
Proceedings of the 25th USENIX Security Symposium, 2016

Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

TriggerScope: Towards Detecting Logic Bombs in Android Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

LAVA: Large-Scale Automated Vulnerability Addition.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Trellis: Privilege Separation for Multi-user Applications Made Easy.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes.
Proceedings of the Financial Cryptography and Data Security, 2016

Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions.
Proceedings of the Financial Cryptography and Data Security, 2016

Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
SENTINEL: Securing Legacy Firefox Extensions.
Comput. Secur., 2015

ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
Proceedings of the 24th USENIX Security Symposium, 2015

BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications.
Proceedings of the Financial Cryptography and Data Security, 2015

Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Why Is CSP Failing? Trends and Challenges in CSP Adoption.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Optical Delusions: A Study of Malicious QR Codes in the Wild.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

VirtualSwindle: an automated attack against in-app billing on android.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

TrueClick: automatically distinguishing trick banners from genuine download links.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
PrivExec: Private Execution as an Operating System Service.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Securing Legacy Firefox Extensions with SENTINEL.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013

PatchDroid: scalable third-party security patches for Android devices.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
An empirical analysis of input validation mechanisms in web applications and languages.
Proceedings of the ACM Symposium on Applied Computing, 2012

Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

TRESOR-HUNT: attacking CPU-bound encryption.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
An Experience in Testing the Security of Real-World Electronic Voting Systems.
IEEE Trans. Software Eng., 2010

Effective Anomaly Detection with Scarce Training Data.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries.
J. Comput. Secur., 2009

Static Enforcement of Web Application Integrity Through Strong Typing.
Proceedings of the 18th USENIX Security Symposium, 2009

Protecting a Moving Target: Addressing Web Application Concept Drift.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

2008
Are your votes <i>really</i> counted?: testing the security of real-world electronic voting systems.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

2007
Exploiting Execution Context for the Detection of Anomalous System Calls.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Improving Signature Testing through Dynamic Data Flow Analysis.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2006

2005
A multi-model approach to the detection of web-based attacks.
Comput. Networks, 2005

Automating Mimicry Attacks Using Static Binary Analysis.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Polymorphic Worm Detection Using Structural Information of Executables.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

2004
Using Alert Verification to Identify Successful Intrusion Attempts.
Prax. Inf.verarb. Kommun., 2004

Static Disassembly of Obfuscated Binaries.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Alert Verification Determining the Success of Intrusion Attempts.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

Testing network-based intrusion detection signatures using mutant exploits.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Detecting Kernel-Level Rootkits Through Binary Analysis.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Topology-Based Detection of Anomalous BGP Messages.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Run-time Detection of Heap-based Overflows.
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003

A Stateful Intrusion Detection System for World-Wide Web Servers.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

Bayesian Event Classification for Intrusion Detection.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003


  Loading...