What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Paul Pearce
Google Scholar
ORCID:
0000-0001-6418-9699
17
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Understanding Routing-Induced Censorship Changes Globally.
Abhishek Bhaskar
Paul Pearce
2024
conf/uss
Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content.
Qinge Xie
Manoj Vignesh Kasi Murali
Paul Pearce
Frank Li
2024
conf/uss
6Sense: Internet-Wide IPv6 Scanning and its Security Applications.
Grant Williams
Mert Erdemir
Amanda Hsu
Shraddha Bhat
Abhishek Bhaskar
Frank Li
Paul Pearce
2023
conf/uss
Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild.
Hammas Bin Tanveer
Rachee Singh
Paul Pearce
Rishab Nithyanand
2022
conf/ccs
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement.
ChangSeok Oh
Chris Kanich
Damon McCoy
Paul Pearce
2022
conf/uss
Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement.
Abhishek Bhaskar
Paul Pearce
2021
conf/uss
Deep Entity Classification: Abusive Account Detection for Online Social Networks.
Teng Xu
Gerard Goossen
Huseyin Kerem Cevahir
Sara Khodeir
Yingyezhe Jin
Frank Li
Shawn Shan
Sagar Patel
David Freeman
Paul Pearce
2020
conf/uss
DELF: Safeguarding deletion correctness in Online Social Networks.
Katriel Cohn-Gordon
Georgios Damaskinos
Divino Neto
Joshi Cordova
Benoît Reitz
Benjamin Strahs
Daniel Obenshain
Paul Pearce
Ioannis Papagiannis
Available Media
2019
conf/uss
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence.
Vector Guo Li
Matthew Dunn
Paul Pearce
Damon McCoy
Geoffrey M. Voelker
Stefan Savage
2018
conf/uss
Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem.
Mohammad Rezaeirad
Brown Farinholt
Hitesh Dharmdasani
Paul Pearce
Kirill Levchenko
Damon McCoy
2017
conf/uss
Characterizing the Nature and Dynamics of Tor Exit Blocking.
Rachee Singh
Rishab Nithyanand
Sadia Afroz
Paul Pearce
Michael Carl Tschantz
Phillipa Gill
Vern Paxson
2017
conf/uss
Global Measurement of DNS Manipulation.
Paul Pearce
Ben Jones
Frank Li
Roya Ensafi
Nick Feamster
Nicholas Weaver
Vern Paxson
2017
conf/sp
Augur: Internet-Wide Detection of Connectivity Disruptions.
Paul Pearce
Roya Ensafi
Frank Li
Nick Feamster
Vern Paxson
2017
conf/sp
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.
Brown Farinholt
Mohammad Rezaeirad
Paul Pearce
Hitesh Dharmdasani
Haikuo Yin
Stevens Le Blond
Damon McCoy
Kirill Levchenko
2015
conf/sp
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Kurt Thomas
Elie Bursztein
Chris Grier
Grant Ho
Nav Jagpal
Alexandros Kapravelos
Damon McCoy
Antonio Nappa
Vern Paxson
Paul Pearce
Niels Provos
Moheeb Abu Rajab
2014
conf/ccs
Characterizing Large-Scale Click Fraud in ZeroAccess.
Paul Pearce
Vacha Dave
Chris Grier
Kirill Levchenko
Saikat Guha
Damon McCoy
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2012
conf/ccs
AdDroid: privilege separation for applications and advertisers in Android.
Paul Pearce
Adrienne Porter Felt
Gabriel Nunez
David A. Wagner
Coauthors
Abhishek Bhaskar
(3)
Adrienne Porter Felt
(1)
Alexandros Kapravelos
(1)
Amanda Hsu
(1)
Antonio Nappa
(1)
Available Media
(1)
Ben Jones
(1)
Benjamin Strahs
(1)
Benoît Reitz
(1)
Brown Farinholt
(2)
ChangSeok Oh
(1)
Chris Grier
(2)
Chris Kanich
(1)
Damon McCoy
(6)
Daniel Obenshain
(1)
David A. Wagner
(1)
David Freeman
(1)
Divino Neto
(1)
Elie Bursztein
(1)
Frank Li
(5)
Gabriel Nunez
(1)
Geoffrey M. Voelker
(2)
Georgios Damaskinos
(1)
Gerard Goossen
(1)
Grant Ho
(1)
Grant Williams
(1)
Haikuo Yin
(1)
Hammas Bin Tanveer
(1)
Hitesh Dharmdasani
(2)
Huseyin Kerem Cevahir
(1)
Ioannis Papagiannis
(1)
Joshi Cordova
(1)
Katriel Cohn-Gordon
(1)
Kirill Levchenko
(3)
Kurt Thomas
(1)
Manoj Vignesh Kasi Murali
(1)
Matthew Dunn
(1)
Mert Erdemir
(1)
Michael Carl Tschantz
(1)
Mohammad Rezaeirad
(2)
Moheeb Abu Rajab
(1)
Nav Jagpal
(1)
Nicholas Weaver
(1)
Nick Feamster
(2)
Niels Provos
(1)
Paul Pearce
(17)
Phillipa Gill
(1)
Qinge Xie
(1)
Rachee Singh
(2)
Rishab Nithyanand
(2)
Roya Ensafi
(2)
Sadia Afroz
(1)
Sagar Patel
(1)
Saikat Guha
(1)
Sara Khodeir
(1)
Shawn Shan
(1)
Shraddha Bhat
(1)
Stefan Savage
(2)
Stevens Le Blond
(1)
Teng Xu
(1)
Vacha Dave
(1)
Vector Guo Li
(1)
Vern Paxson
(5)
Yingyezhe Jin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to