Kevin Borgolte

Orcid: 0000-0001-7427-7852

According to our database1, Kevin Borgolte authored at least 30 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions.
Gov. Inf. Q., October, 2023

IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2021
Human Factors in Security Research: Lessons Learned from 2008-2018.
CoRR, 2021

Can Encrypted DNS Be Fast?
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Designing for Tussle in Encrypted DNS.
Proceedings of the HotNets '21: The 20th ACM Workshop on Hot Topics in Networks, 2021

Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Encryption without centralization: distributing DNS queries across recursive resolvers.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

2020
Measuring the Performance of Encrypted DNS Protocols from Broadband Access Networks.
CoRR, 2020

Classifying Network Vendors at Internet Scale.
CoRR, 2020

Supporting Early and Scalable Discovery of Disinformation Websites.
CoRR, 2020

D-DNS: Towards Re-Decentralizing the DNS.
CoRR, 2020

Comparing the Effects of DNS, DoT, and DoH on Web Performance.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Understanding the Performance Costs and Benefits of Privacy-focused Browser Extensions.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Identifying Disinformation Websites Using Infrastructure Features.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

2019
Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern web.
Proceedings of the Applied Networking Research Workshop, 2019

2018
Identifying and Preventing Large-scale Internet Abuse.
PhD thesis, 2018

Mechanical Phish: Resilient Autonomous Hacking.
IEEE Secur. Priv., 2018

Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

In rDNS We Trust: Revisiting a Common Data-Source's Reliability.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Investigating System Operators' Perspective on Security Misconfigurations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Something from Nothing (There): Collecting Global IPv6 Datasets from DNS.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

2015
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications.
IEEE Trans. Inf. Forensics Secur., 2015

Meerkat: Detecting Website Defacements through Image-based Object Recognition.
Proceedings of the 24th USENIX Security Symposium, 2015

Drops for Stuff: An Analysis of Reshipping Mule Scams.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines.
Proceedings of the 23rd International World Wide Web Conference, 2014

Ten Years of iCTF: The Good, The Bad, and The Ugly.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2013
Delta: automatic identification of unknown web-based infection campaigns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...