Deepak Kumar
Deepak Kumar
Verified email at - Homepage
Cited by
Cited by
Understanding the Mirai Botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX Security Sympsium, 2017
Skill Squatting Attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th USENIX Security Symposium, 2018
All Things Considered: An Analysis of IoT Devices on Home Networks
D Kumar, K Shen, B Case, D Garg, G Alperovich, D Kuznetsov, ...
28th USENIX Security Symposium, 2019
Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
27th USENIX Security Symposium, 2018
Tracking Certificate Misissuance in the Wild
D Kumar, M Bailey, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, ...
39th IEEE Symposium on Security and Privacy, 2018
Security Challenges in an Increasingly Tangled Web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
26th International World Wide Web Conference, 2017, 2017
SoK: Plug & Pray Today: Understanding USB Insecurity in Versions 1 through C
J Tian, N Scaife, D Kumar, M Bailey, A Bates, K Butler
IEEE Symposium on Security and Privacy, 15, 2018
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
IEEE Security and Privacy 2021, 2021
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
The system can't perform the operation now. Try again later.
Articles 1–9