Amin Kharraz

Orcid: 0000-0002-7841-3409

According to our database1, Amin Kharraz authored at least 16 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
EnSolver: Uncertainty-Aware CAPTCHA Solver Using Deep Ensembles.
CoRR, 2023

An End-to-End Analysis of Covid-Themed Scams in the Wild.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2021
WebSocket Adoption and the Landscape of the Real-Time Web.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Preventing server-side request forgery attacks.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

2019
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
Proceedings of the World Wide Web Conference, 2019

USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

2018
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas?
IEEE Secur. Priv., 2018

Surveylance: Automatically Detecting Online Survey Scams.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Redemption: Real-Time Protection Against Ransomware at End-Hosts.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2016
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware.
Proceedings of the 25th USENIX Security Symposium, 2016

Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
Optical Delusions: A Study of Malicious QR Codes in the Wild.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014


  Loading...