Zakir Durumeric

Orcid: 0000-0002-9647-4192

According to our database1, Zakir Durumeric authored at least 67 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Democratizing LEO Satellite Network Measurement.
Proc. ACM Meas. Anal. Comput. Syst., 2024

On the Centralization and Regionalization of the Web.
CoRR, 2024

The Code the World Depends On: A First Look at Technology Makers' Open Source Software Dependencies.
CoRR, 2024

CATO: End-to-End Optimization of ML-Based Traffic Analysis Pipelines.
CoRR, 2024

PressProtect: Helping Journalists Navigate Social Media in the Face of Online Harassment.
CoRR, 2024

Specious Sites: Tracking the Spread and Sway of Spurious News Stories at Scale.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Ten Years of ZMap.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Machine-Made Media: Monitoring the Mobilization of Machine-Generated Articles on Misinformation and Mainstream News Websites.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

Partial Mobilization: Tracking Multilingual Information Flows amongst Russian Media Outlets and Telegram.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

Watch Your Language: Investigating Content Moderation with Large Language Models.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

2023
Hate Raids on Twitch: Echoes of the Past, New Modalities, and Implications for Platform Governance.
Proc. ACM Hum. Comput. Interact., April, 2023

A Golden Age: Conspiracy Theories' Relationship with Misinformation Outlets, News Media, and the Wider Internet.
Proc. ACM Hum. Comput. Interact., 2023

Watch Your Language: Large Language Models and Content Moderation.
CoRR, 2023

Twits, Toxic Tweets, and Tribal Tendencies: Trends in Politically Polarized Posts on Twitter.
CoRR, 2023

Sub-Standards and Mal-Practices: Misinformation's Role in Insular, Polarized, and Toxic Interactions.
CoRR, 2023

Understanding the Behaviors of Toxic Accounts on Reddit.
Proceedings of the ACM Web Conference 2023, 2023

Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Cloud Watching: Understanding Attacks Against Cloud-Hosted Services.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

"A Special Operation": A Quantitative Approach to Dissecting and Comparing Different Media Ecosystems' Coverage of the Russo-Ukrainian War.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Happenstance: Utilizing Semantic Search to Track Russian State Media Narratives about the Russo-Ukrainian War on Reddit.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

TATA: Stance Detection via Topic-Agnostic and Topic-Aware Embeddings.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

2022
Understanding Longitudinal Behaviors of Toxic Accounts on Reddit.
CoRR, 2022

Retina: analyzing 100GbE traffic on commodity hardware.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

Predicting IPv4 services across all ports.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

A world wide view of browsing the world wide web.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Toppling top lists: evaluating the accuracy of popular website lists.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

ZDNS: a fast DNS toolkit for internet measurement.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Retroactive identification of targeted DNS infrastructure hijacking.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

No Calm in the Storm: Investigating QAnon Website Relationships.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

On the Infrastructure Providers That Support Misinformation Websites.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

2021
An Empirical Analysis of HTTPS Configuration Security.
CoRR, 2021

What's in a Name? Exploring CA Certificate Control.
Proceedings of the 30th USENIX Security Symposium, 2021

LZR: Identifying Unexpected Internet Services.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Designing Toxic Content Classification for a Diversity of Perspectives.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Stratosphere: Finding Vulnerable Cloud Storage Buckets.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

ASdb: a system for classifying owners of autonomous systems.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Tracing your roots: exploring the TLS trust anchor ecosystem.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Imperfect forward secrecy: how Diffie-Hellman fails in practice.
Commun. ACM, 2019

All Things Considered: An Analysis of IoT Devices on Home Networks.
Proceedings of the 28th USENIX Security Symposium, 2019

Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Scanning the Internet for Liveness.
Comput. Commun. Rev., 2018

Tracking Certificate Misissuance in the Wild.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Fast Internet-Wide Scanning: A New Security Perspective.
PhD thesis, 2017

The Danger of USB Drives.
IEEE Secur. Priv., 2017

Security Challenges in an Increasingly Tangled Web.
Proceedings of the 26th International Conference on World Wide Web, 2017


The Security Impact of HTTPS Interception.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Target generation for internet-wide IPv6 scanning.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium, 2016

Users Really Do Plug in USB Drives They Find.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

An Internet-wide view of ICS devices.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Towards a Complete View of the Certificate Ecosystem.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Measuring the Security Harm of TLS Crypto Shortcuts.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

FTP: The Forgotten Cloud.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

A Search Engine Backed by Internet-Wide Scanning.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Zippier ZMap: Internet-Wide Scanning at 10 Gbps.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

An Internet-Wide View of Internet-Wide Scanning.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

On the Mismanagement and Maliciousness of Networks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

The Matter of Heartbleed.
Proceedings of the 2014 Internet Measurement Conference, 2014

Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security.
Proceedings of the Financial Cryptography and Data Security, 2014

Security Analysis of the Estonian Internet Voting System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
ZMap: Fast Internet-wide Scanning and Its Security Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Analysis of the HTTPS certificate ecosystem.
Proceedings of the 2013 Internet Measurement Conference, 2013

2012
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012


  Loading...