From very weak to very strong: Analyzing password-strength meters X de Carné de Carnavalet, M Mannan Network and Distributed System Security Symposium (NDSS 2014), 2014 | 200 | 2014 |
A Large-Scale Evaluation of High-Impact Password Strength Meters X de Carné de Carnavalet, M Mannan ACM Transactions on Information and System Security (TISSEC) 18 (1), 1, 2015 | 111 | 2015 |
Killed by proxy: Analyzing client-end TLS interception software X de Carné de Carnavalet, M Mannan Network and Distributed System Security Symposium, 2016 | 100 | 2016 |
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security M Zhang, X de Carné de Carnavalet, L Wang, A Ragab IEEE Transactions on Information Forensics and Security 14 (9), 2315-2330, 2019 | 31 | 2019 |
A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made “end-to-me” for web traffic X de Carné de Carnavalet, PC van Oorschot ACM Computing Surveys 55 (13s), 1-40, 2023 | 27 | 2023 |
Challenges and implications of verifiable builds for security-critical open-source software X de Carné de Carnavalet, M Mannan Proceedings of the 30th Annual Computer Security Applications Conference, 16-25, 2014 | 19 | 2014 |
Privacy and Security Risks of" Not-a-Virus" Bundled Adware: The Wajam Case X de Carné de Carnavalet, M Mannan arXiv preprint arXiv:1905.05224, 2019 | 7 | 2019 |
Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem X de Carné de Carnavalet Concordia University, 2019 | 4 | 2019 |
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD S Zhang, M Cai, M Zhang, L Zhao, X de Carné de Carnavalet CloudCom, 2023 | 3 | 2023 |
Face recognition using multi-class Logical Analysis of Data A Ragab, X de Carné de Carnavalet, S Yacout, MS Ouali Pattern Recognition and Image Analysis 27 (2), 276-288, 2017 | 3 | 2017 |
Exposed by Default: A Security Analysis of Home Router Default Settings J Ye, X de Carné de Carnavalet, L Zhao, M Zhang, L Wu, W Zhang Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 2 | 2024 |
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions J Ye, X Fei, X de Carné de Carnavalet, L Zhao, L Wu, M Zhang Computers & Security, 103971, 2024 | 2 | 2024 |
Exposed by Default: A Security Analysis of Home Router Default Settings and Beyond J Ye, XC de Carnavalet, L Zhao, M Zhang, L Wu, W Zhang IEEE Internet of Things Journal, 2024 | | 2024 |