Seuraa
Grant Ho
Grant Ho
Vahvistettu sähköpostiosoite verkkotunnuksessa uchicago.edu - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Smart locks: Lessons for securing commodity internet of things devices
G Ho, D Leung, P Mishra, A Hosseini, D Song, D Wagner
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
3762016
Detecting credential spearphishing in enterprise settings
G Ho, A Sharma, M Javed, V Paxson, D Wagner
26th USENIX security symposium (USENIX security 17), 469-485, 2017
1682017
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1672015
Detecting and characterizing lateral phishing at scale
G Ho, A Cidon, L Gavish, M Schweighauser, V Paxson, S Savage, ...
28th USENIX security symposium (USENIX security 19), 1273-1290, 2019
1272019
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
822016
Driving {2FA} adoption at scale: Optimizing {Two-Factor} authentication notification design patterns
M Golla, G Ho, M Lohmus, M Pulluri, EM Redmiles
30th USENIX Security Symposium (USENIX Security 21), 109-126, 2021
532021
Hopper: Modeling and detecting lateral movement
G Ho, M Dhiman, D Akhawe, V Paxson, S Savage, GM Voelker, D Wagner
30th USENIX Security Symposium (USENIX Security 21), 3093-3110, 2021
422021
Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics
G Ho
Technicalreport, StanfordUniversity 73, 74, 2014
402014
Tick tock: building browser red pills from timing side channels
G Ho, D Boneh, L Ballard, N Provos
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
252014
No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps
E Liu, S Rao, S Havron, G Ho, S Savage, GM Voelker, D McCoy
Proceedings on Privacy Enhancing Technologies, 2023
192023
Forward pass: On the security implications of email forwarding mechanism and policy
E Liu, G Akiwate, M Jonker, A Mirian, G Ho, GM Voelker, S Savage
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 373-391, 2023
52023
Understanding the viability of gmail's origin indicator for identifying the sender
E Liu, L Sun, A Bellon, G Ho, GM Voelker, S Savage, INS Munyaka
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 77-95, 2023
52023
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts
N Shah, G Ho, M Schweighauser, M Ibrahim, A Cidon, D Wagner
Deployable Machine Learning for Security Defense: First International …, 2020
22020
Understanding the Efficacy of Phishing Training in Practice
G Ho, A Mirian, E Luo, K Tong, E Lee, L Liu, CA Longhurst, C Dameff, ...
2025 IEEE Symposium on Security and Privacy (SP), 76-76, 2024
12024
Unfiltered: Measuring Cloud-based Email Filtering Bypasses
S Rao, E Liu, G Ho, GM Voelker, S Savage
Proceedings of the ACM on Web Conference 2024, 1702-1711, 2024
12024
Characterizing the Networks Sending Enterprise Phishing Emails
E Luo, L Young, G Ho, MH Afifi, M Schweighauser, E Katz-Bassett, ...
arXiv preprint arXiv:2412.12403, 2024
2024
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates
M Ariana, H Grant, S Stefan, V Geoffrey M
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
2023
Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights
G Ho
University of California, Berkeley, 2020
2020
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–18