Kevin Borgolte
Kevin Borgolte
Verified email at tudelft.nl - Homepage
Title
Cited by
Cited by
Year
Delta: Automatic Identification of Unknown Web-based Infection Campaigns
K Borgolte, C Kruegel, G Vigna
20th ACM SIGSAC Conference on Computer & Communications Security (CCS), 109-120, 2013
712013
Ten Years of iCTF: The Good, The Bad, and The Ugly
G Vigna, K Borgolte, J Corbetta, A Doupé, Y Fratantonio, L Invernizzi, ...
1st USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
602014
Meerkat: Detecting Website Defacements through Image-based Object Recognition
K Borgolte, C Kruegel, G Vigna
24th USENIX Security Symposium (USENIX Security), 2015
522015
Investigating System Operators' Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
25th ACM SIGSAC Conference on Computer & Communications Security (CCS), 2018
342018
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna
18th International Conference on Passive and Active Network Measurement (PAM), 2017
292017
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
K Borgolte, S Hao, T Fiebig, G Vigna
39th IEEE Symposium on Security & Privacy (S&P), 2018
232018
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
K Borgolte, T Fiebig, S Hao, C Kruegel, G Vigna
25th Network and Distributed Systems Security Symposium (NDSS), 2018
232018
Drops for Stuff: An Analysis of Reshipping Mule Scams
S Hao, K Borgolte, N Nikiforakis, G Stringhini, M Egele, M Eubanks, ...
22nd ACM SIGSAC Conference on Computer & Communications Security (CCS), 2015
232015
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications
M Payer, L Huang, NZ Gong, K Borgolte, M Frank
IEEE Transactions on Information Forensics and Security 10 (1), 200-212, 2015
222015
Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel
Y Cao, Y Shoshitaishvili, K Borgolte, C Kruegel, G Vigna, Y Chen
17th International Symposium on Research in Attacks, Intrusions and Defense …, 2014
19*2014
In rDNS We Trust: Revisiting a Common Data-Source’s Reliability
T Fiebig, K Borgolte, S Hao, C Kruegel, G Vigna, A Feldmann
19th International Conference on Passive and Active Network Measurement (PAM), 2018
142018
How DNS over HTTPS is Reshaping Privacy, Performance, and Policy in the Internet Ecosystem
K Borgolte, T Chattopadhyay, N Feamster, M Kshirsagar, J Holland, ...
47th Research Conference on Communications, Information and Internet Policy …, 2019
132019
Relevant Change Detection: Framework for the Precise Extraction of Modified and Novel Web-based Content as a Filtering Technique for Analysis Engines
K Borgolte, C Kruegel, G Vigna
23rd International World Wide Web Conference Companion (WWW), 595-597, 2014
122014
Analyzing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web
A Hounsel, K Borgolte, P Schmitt, J Holland, N Feamster
arXiv preprint arXiv:1907.08089, 2019
112019
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks
W Meng, C Qian, S Hao, K Borgolte, G Vigna, C Kruegel, W Lee
27th USENIX Security Symposium (USENIX Security), 2018
112018
Mechanical Phish: Resilient Autonomous Hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
102018
Comparing the Effects of DNS, DoT, and DoH on Web Performance
A Hounsel, K Borgolte, P Schmitt, J Holland, N Feamster
Proceedings of The Web Conference 2020, 562-572, 2020
42020
Supporting Early and Scalable Discovery of Disinformation Websites
A Hounsel, J Holland, B Kaiser, K Borgolte, N Feamster, J Mayer
arXiv preprint arXiv:2003.07684, 2020
32020
Identifying Disinformation Websites Using Infrastructure Features
A Hounsel, J Holland, B Kaiser, K Borgolte, N Feamster, J Mayer
10th {USENIX} Workshop on Free and Open Communications on the Internet …, 2020
32020
A Brief Analysis of the ISIS/ISIL Defacement Campaign
K Borgolte
https://goo.gl/OcRRsh, 2014
3*2014
The system can't perform the operation now. Try again later.
Articles 1–20