What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Frank Li
Google Scholar
26
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Was This You? Investigating the Design Considerations for Suspicious Login Notifications.
Sena Sahin
Burak Sahin
Frank Li
2024
conf/ccs
Unmasking the Security and Usability of Password Masking.
Yuqi Hu
Suood Alroomi
Sena Sahin
Frank Li
2024
conf/ccs
Release the Hounds! Automated Inference and Empirical Security Evaluation of Field-Deployed PLCs Using Active Network Data.
Ryan Pickren
Animesh Chhotaray
Frank Li
Saman A. Zonouz
Raheem Beyah
2024
conf/uss
Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content.
Qinge Xie
Manoj Vignesh Kasi Murali
Paul Pearce
Frank Li
2024
conf/uss
6Sense: Internet-Wide IPv6 Scanning and its Security Applications.
Grant Williams
Mert Erdemir
Amanda Hsu
Shraddha Bhat
Abhishek Bhaskar
Frank Li
Paul Pearce
2024
conf/uss
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures.
Mingyi Liu
Jun Ho Huh
HyungSeok Han
Jaehyuk Lee
Jihae Ahn
Frank Li
Hyoungshick Kim
Taesoo Kim
2024
conf/soups
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts.
Miuyin Yong Wong
Matthew Landen
Frank Li
Fabian Monrose
Mustaque Ahamad
2023
conf/ccs
Evaluating the Security Posture of Real-World FIDO2 Deployments.
Dhruv Kuchhal
Muhammad Saad
Adam Oest
Frank Li
2023
conf/ccs
Measuring Website Password Creation Policies At Scale.
Suood Alroomi
Frank Li
2023
conf/uss
A Large-Scale Measurement of Website Login Policies.
Suood Abdulaziz Al-Roomi
Frank Li
2023
conf/sp
Investigating the Password Policy Practices of Website Administrators.
Sena Sahin
Suood Abdulaziz Al-Roomi
Tara Poteat
Frank Li
2022
conf/uss
Building an Open, Robust, and Stable Voting-Based Domain Top List.
Qinge Xie
Shujun Tang
Xiaofeng Zheng
Qingran Lin
Baojun Liu
Haixin Duan
Frank Li
2021
conf/ccs
Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication.
Sena Sahin
Frank Li
2021
conf/uss
Deep Entity Classification: Abusive Account Detection for Online Social Networks.
Teng Xu
Gerard Goossen
Huseyin Kerem Cevahir
Sara Khodeir
Yingyezhe Jin
Frank Li
Shawn Shan
Sagar Patel
David Freeman
Paul Pearce
2021
conf/dsn
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
Afsah Anwar
Ahmed Abusnaina
Songqing Chen
Frank Li
David Mohaisen
2020
conf/uss
Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web.
Frank Li
2019
conf/soups
Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines.
Frank Li
Lisa Rogers
Arunesh Mathur
Nathan Malkin
Marshini Chetty
2018
conf/ndss
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.
Ben Stock
Giancarlo Pellegrino
Frank Li
Michael Backes
Christian Rossow
2017
conf/ccs
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Kurt Thomas
Frank Li
Ali Zand
Jacob Barrett
Juri Ranieri
Luca Invernizzi
Yarik Markov
Oxana Comanescu
Vijay Eranti
Angelika Moscicki
Daniel Margolis
Vern Paxson
Elie Bursztein
2017
conf/ccs
A Large-Scale Empirical Study of Security Patches.
Frank Li
Vern Paxson
2017
conf/uss
Global Measurement of DNS Manipulation.
Paul Pearce
Ben Jones
Frank Li
Roya Ensafi
Nick Feamster
Nicholas Weaver
Vern Paxson
2017
conf/sp
Augur: Internet-Wide Detection of Connectivity Disruptions.
Paul Pearce
Roya Ensafi
Frank Li
Nick Feamster
Vern Paxson
2016
conf/uss
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Frank Li
Zakir Durumeric
Jakub Czyz
Mohammad Karami
Michael D. Bailey
Damon McCoy
Stefan Savage
Vern Paxson
2015
conf/ccs
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Frank Li
Richard Shin
Vern Paxson
2014
conf/ccs
Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Kurt Thomas
Frank Li
Chris Grier
Vern Paxson
2013
conf/esorics
Data-Confined HTML5 Applications.
Devdatta Akhawe
Frank Li
Warren He
Prateek Saxena
Dawn Song
Coauthors
Abhishek Bhaskar
(1)
Adam Oest
(1)
Afsah Anwar
(1)
Ahmed Abusnaina
(1)
Ali Zand
(1)
Amanda Hsu
(1)
Angelika Moscicki
(1)
Animesh Chhotaray
(1)
Arunesh Mathur
(1)
Baojun Liu
(1)
Ben Jones
(1)
Ben Stock
(1)
Burak Sahin
(1)
Chris Grier
(1)
Christian Rossow
(1)
Damon McCoy
(1)
Daniel Margolis
(1)
David Freeman
(1)
David Mohaisen
(1)
Dawn Song
(1)
Devdatta Akhawe
(1)
Dhruv Kuchhal
(1)
Elie Bursztein
(1)
Fabian Monrose
(1)
Frank Li
(26)
Gerard Goossen
(1)
Giancarlo Pellegrino
(1)
Grant Williams
(1)
Haixin Duan
(1)
Huseyin Kerem Cevahir
(1)
Hyoungshick Kim
(1)
HyungSeok Han
(1)
Jacob Barrett
(1)
Jaehyuk Lee
(1)
Jakub Czyz
(1)
Jihae Ahn
(1)
Jun Ho Huh
(1)
Juri Ranieri
(1)
Kurt Thomas
(2)
Lisa Rogers
(1)
Luca Invernizzi
(1)
Manoj Vignesh Kasi Murali
(1)
Marshini Chetty
(1)
Matthew Landen
(1)
Mert Erdemir
(1)
Michael Backes
(1)
Michael D. Bailey
(1)
Mingyi Liu
(1)
Miuyin Yong Wong
(1)
Mohammad Karami
(1)
Muhammad Saad
(1)
Mustaque Ahamad
(1)
Nathan Malkin
(1)
Nicholas Weaver
(1)
Nick Feamster
(2)
Oxana Comanescu
(1)
Paul Pearce
(5)
Prateek Saxena
(1)
Qinge Xie
(2)
Qingran Lin
(1)
Raheem Beyah
(1)
Richard Shin
(1)
Roya Ensafi
(2)
Ryan Pickren
(1)
Sagar Patel
(1)
Saman A. Zonouz
(1)
Sara Khodeir
(1)
Sena Sahin
(4)
Shawn Shan
(1)
Shraddha Bhat
(1)
Shujun Tang
(1)
Songqing Chen
(1)
Stefan Savage
(1)
Suood Abdulaziz Al-Roomi
(2)
Suood Alroomi
(2)
Taesoo Kim
(1)
Tara Poteat
(1)
Teng Xu
(1)
Vern Paxson
(7)
Vijay Eranti
(1)
Warren He
(1)
Xiaofeng Zheng
(1)
Yarik Markov
(1)
Yingyezhe Jin
(1)
Yuqi Hu
(1)
Zakir Durumeric
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to