Phani Vadrevu

According to our database1, Phani Vadrevu authored at least 15 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
CoRR, 2024

SENet: Visual Detection of Online Social Engineering Attack Campaigns.
CoRR, 2024

2023
Understanding, Measuring, and Detecting Modern Technical Support Scams.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
PhishInPatterns: measuring elicited user interactions at scale on phishing websites.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Your speaker or my snooper?: measuring the effectiveness of web audio browser fingerprints.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2021
A Study of Feasibility and Diversity of Web Audio Fingerprints.
CoRR, 2021

PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Measuring Abuse in Web Push Advertising.
CoRR, 2020

When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns.
Proceedings of the Internet Measurement Conference, 2019

2018
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2013
Measuring and Detecting Malware Downloads in Live Network Traffic.
Proceedings of the Computer Security - ESORICS 2013, 2013


  Loading...