| Tunneling for transparency: A large-scale analysis of end-to-end violations in the internet T Chung, D Choffnes, A Mislove Proceedings of the 2016 Internet Measurement Conference, 2016 | 248* | 2016 |
| A Longitudinal,{End-to-End} View of the {DNSSEC} Ecosystem T Chung, R van Rijswijk-Deij, B Chandrasekaran, D Choffnes, D Levin, ... 26th USENIX Security Symposium (USENIX Security 17), 1307-1322, 2017 | 184 | 2017 |
| Characterizing conversation patterns in reddit: From the perspectives of content properties and user participation behaviors D Choi, J Han, T Chung, YY Ahn, BG Chun, TT Kwon Proceedings of the 2015 acm on conference on online social networks, 233-243, 2015 | 149 | 2015 |
| Measurement and analysis of private key sharing in the https ecosystem F Cangialosi, T Chung, D Choffnes, D Levin, BM Maggs, A Mislove, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 126 | 2016 |
| RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins T Chung, E Aben, T Bruijnzeels, B Chandrasekaran, D Choffnes, D Levin, ... Proceedings of the Internet Measurement Conference, 406-419, 2019 | 111 | 2019 |
| Measuring and applying invalid SSL certificates: The silent majority T Chung, Y Liu, D Choffnes, D Levin, BMD Maggs, A Mislove, C Wilson Proceedings of the 2016 Internet Measurement Conference, 527-541, 2016 | 109 | 2016 |
| Understanding the role of registrars in DNSSEC deployment T Chung, R van Rijswijk-Deij, D Choffnes, D Levin, BM Maggs, A Mislove, ... Proceedings of the 2017 Internet Measurement Conference, 369-383, 2017 | 99 | 2017 |
| Is the web ready for OCSP must-staple? T Chung, J Lok, B Chandrasekaran, D Choffnes, D Levin, BM Maggs, ... Proceedings of the Internet Measurement Conference 2018, 105-118, 2018 | 64 | 2018 |
| You are who you appear to be: A longitudinal study of domain impersonation in tls certificates R Roberts, Y Goldschlag, R Walter, T Chung, A Mislove, D Levin Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 62 | 2019 |
| A first look at certification authority authorization (CAA) Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ... ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018 | 61 | 2018 |
| maTLS: How to Make TLS middlebox-aware? H Lee, Z Smith, J Lim, G Choi, S Chun, T Chung, TT Kwon NDSS, 2019 | 59 | 2019 |
| An analysis of recent advances in deepfake image detection in an evolving threat landscape SM Abdullah, A Cheruvu, S Kanchi, T Chung, P Gao, M Jadliwala, ... 2024 IEEE Symposium on Security and Privacy (SP), 91-109, 2024 | 49 | 2024 |
| RoVista: Measuring and analyzing the route origin validation (ROV) in RPKI W Li, Z Lin, MI Ashiq, E Aben, R Fontugne, A Phokeer, T Chung Proceedings of the 2023 ACM on Internet Measurement Conference, 73-88, 2023 | 46 | 2023 |
| A comparative analysis of certificate pinning in Android & iOS A Pradeep, MT Paracha, P Bhowmick, A Davanian, A Razaghpanah, ... Proceedings of the 22nd ACM Internet Measurement Conference, 605-618, 2022 | 42 | 2022 |
| The Ties that un-Bind: Decoupling IP from web services and sockets for robust addressing agility at CDN-scale M Fayed, L Bauer, V Giotsas, S Kerola, M Majkowski, P Odintsov, ... Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 433-446, 2021 | 38 | 2021 |
| A longitudinal and comprehensive study of the {dane} ecosystem in email H Lee, A Gireesh, R van Rijswijk-Deij, T Chung 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 37 | 2020 |
| Bundling practice in bittorrent: What, how, and why J Han, S Kim, T Chung, TT Kwon, H Kim, Y Choi ACM SIGMETRICS performance evaluation review 40 (1), 77-88, 2012 | 29 | 2012 |
| The reality of algorithm agility: Studying the DNSSEC algorithm life-cycle M Müller, W Toorop, T Chung, J Jansen, R van Rijswijk-Deij Proceedings of the ACM Internet Measurement Conference, 295-308, 2020 | 26 | 2020 |
| Under the hood of {DANE} mismanagement in {SMTP} H Lee, MI Ashiq, M Müller, R van Rijswijk-Deij, T Chung 31st USENIX Security Symposium (USENIX Security 22), 1-16, 2022 | 25 | 2022 |
| Roll, roll, roll your root: A comprehensive analysis of the first ever DNSSEC root KSK rollover M Müller, M Thomas, D Wessels, W Hardaker, T Chung, W Toorop, ... Proceedings of the Internet Measurement Conference, 1-14, 2019 | 25 | 2019 |