[go: up one dir, main page]

Follow
Zane Ma
Zane Ma
Verified email at oregonstate.edu - Homepage
Title
Cited by
Cited by
Year
Understanding the Mirai botnet
Z Ma, M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, ...
26th USENIX Security Symposium (Sec '17), 1093-1110, 2017
3222*2017
Measuring Ethereum Network Peers
SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey
ACM Internet Measurement Conference, 91-104, 2018
2482018
The Security Impact of HTTPS Interception.
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
NDSS, 2017
2452017
An Internet-wide View of ICS Devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
1522016
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
1402019
Security challenges in an increasingly tangled web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
The World Wide Web Conference (WWW '17), 677-684, 2017
892017
Websocket adoption and the landscape of the real-time web
P Murley, Z Ma, J Mason, M Bailey, A Kharraz
Proceedings of the Web Conference 2021, 1192-1203, 2021
732021
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
442020
Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem
Z Ma, J Austgen, J Mason, Z Durumeric, M Bailey
ACM Internet Measurement Conference, 2021
232021
What's in a Name? Exploring CA Certificate Control
Z Ma, J Mason, M Antonakakis, Z Durumeric, M Bailey
30th USENIX Security Symposium (USENIX Security 21), 4383-4400, 2021
202021
Practical attacks against DNS reputation systems
T Galloway, K Karakolios, Z Ma, R Perdisci, A Keromytis, M Antonakakis
2024 IEEE Symposium on Security and Privacy (SP), 4516-4534, 2024
172024
The impact of secure transport protocols on phishing efficacy
Z Ma, J Reynolds, J Dickinson, K Wang, T Judd, JD Barnes, J Mason, ...
152019
Stale TLS certificates: Investigating precarious third-party access to valid TLS keys
Z Ma, A Faulkenberry, T Papastergiou, Z Durumeric, MD Bailey, ...
Proceedings of the 2023 ACM on Internet Measurement Conference, 222-235, 2023
132023
View from above: Exploring the malware ecosystem from the upper dns hierarchy
A Faulkenberry, A Avgetidis, Z Ma, O Alrawi, C Lever, P Kintis, F Monrose, ...
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
122022
Understanding the Trust Relationships of the Web PKI
Z Ma
University of Illinois at Urbana-Champaign, 2021
42021
From Concealment to Exposure: Understanding the Lifecycle and Infrastructure of APT Domains
A Avgetidis, A Faulkenberry, V Adjibi, T Galloway, P Kintis, O Alrawi, Z Ma, ...
Research in Attacks, Intrusions and Defenses (RAID), 2025
2025
Understanding Orphan Flows
KS Tharayil, A Avgetidis, Z Ma, M Antonakakis, AD Keromytis
Network Traffic Measurement and Analysis Conference (TMA), 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–17