Adam Oest

Orcid: 0000-0002-4313-3714

According to our database1, Adam Oest authored at least 20 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
CoRR, 2024

2023
Can I Own Your NFTs? Understanding the New Attack Surface to NFTs.
IEEE Commun. Mag., September, 2023

Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures.
IEEE Internet Things J., July, 2023

Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Evaluating the Security Posture of Real-World FIDO2 Deployments.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv., 2022

Phishing Detection Leveraging Machine Learning and Deep Learning: A Review.
IEEE Secur. Priv., 2022

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

Analysis of Payment Service Provider SDKs in Android.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Proceedings of the 30th USENIX Security Symposium, 2021

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Proceedings of the 29th USENIX Security Symposium, 2020

Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

2013
Student development of board game strategies in a web-based graphical infrastructure (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Feedback-driven clustering for automated linking of web pages.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Programming board-game strategies in the introductory CS sequence (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012


  Loading...