Adam Doupé

Orcid: 0000-0003-2634-3901

Affiliations:
  • Arizona State University


According to our database1, Adam Doupé authored at least 82 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv., 2022

Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation.
CoRR, 2022

Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability.
Proceedings of the 31st USENIX Security Symposium, 2022

Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Proceedings of the 31st USENIX Security Symposium, 2022

Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention.
Proceedings of the 31st USENIX Security Symposium, 2022

"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Context-Auditor: Context-sensitive Content Injection Mitigation.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Improving source-code representations to enhance search-based software repair.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022

Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
Challenges in cybersecurity: Lessons from biological defense systems.
CoRR, 2021

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Proceedings of the 30th USENIX Security Symposium, 2021

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Software Deception Steering through Version Emulation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).
Proceedings of the Financial Cryptography and Data Security, 2021

Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Proceedings of the 29th USENIX Security Symposium, 2020

SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Exploring Abstraction Functions in Fuzzing.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Users Really Do Answer Telephone Scams.
Proceedings of the 28th USENIX Security Symposium, 2019

Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting.
Proceedings of the 28th USENIX Security Symposium, 2019

PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

History and Future of Automated Vulnerability Analysis.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

iCore: continuous and proactive extrospection on multi-core IoT devices.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Understanding and Predicting Private Interactions in Underground Forums.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Measuring E-mail header injections on the world wide web.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Challenges, Opportunities and a Framework for Web Environment Forensics.
Proceedings of the Advances in Digital Forensics XIV, 2018

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Challenges and Preparedness of SDN-based Firewalls.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

CacheLight: Defeating the CacheKit Attack.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

AIM-SDN: Attacking Information Mismanagement in SDN-datastores.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
E-mail Header Injection Vulnerabilities.
it Inf. Technol., 2017

Toward Standardization of Authenticated Caller ID Transmission.
IEEE Commun. Stand. Mag., 2017

Shell We Play A Game? CTF-as-a-service for Security Education.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

Deep Android Malware Detection.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Panel: Trustworthy Data Science.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

HoneyProxy: Design and implementation of next-generation honeynet via SDN.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
dbling: Identifying extensions installed on encrypted web thin clients.
Digit. Investig., 2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games.
CoRR, 2016

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Target Fragmentation in Android Apps.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

State-aware Network Access Management for Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation.
Proceedings of the 2016 ITU Kaleidoscope: ICTs for a Sustainable World, 2016

Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Towards Automated Threat Intelligence Fusion.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

HoneyMix: Toward SDN-based Intelligent Honeynet.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

Checking Intent-based Communication in Android with Intent Space Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Toward a Moving Target Defense for Web Applications.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

2014
Advanced Automated Web Application Vulnerability Analysis.
PhD thesis, 2014

Ten Years of iCTF: The Good, The Bad, and The Ugly.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security.
Proceedings of the Symposium on Applied Computing, 2014

2013
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Writing groups in computer science research labs.
Proceedings of the IEEE Frontiers in Education Conference, 2013

deDacota: toward preventing server-side XSS via automatic code and data separation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Hit 'em where it hurts: a live security exercise on cyber situational awareness.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners.
Proceedings of the Detection of Intrusions and Malware, 2010


  Loading...