Zane Ma
Zane Ma
Verified email at - Homepage
Cited by
Cited by
Understanding the Mirai botnet
Z Ma, M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, ...
26th USENIX Security Symposium (Sec '17), 1093-1110, 2017
The Security Impact of HTTPS Interception.
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
NDSS, 2017
Measuring Ethereum Network Peers
SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey
ACM Internet Measurement Conference, 91-104, 2018
An Internet-wide View of ICS Devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
Security challenges in an increasingly tangled web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
The World Wide Web Conference (WWW '17), 677-684, 2017
Websocket adoption and the landscape of the real-time web
P Murley, Z Ma, J Mason, M Bailey, A Kharraz
Proceedings of the Web Conference 2021, 1192-1203, 2021
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem
Z Ma, J Austgen, J Mason, Z Durumeric, M Bailey
ACM Internet Measurement Conference, 2021
What's in a Name? Exploring CA Certificate Control
Z Ma, J Mason, M Antonakakis, Z Durumeric, M Bailey
30th USENIX Security Symposium (USENIX Security 21), 4383-4400, 2021
The impact of secure transport protocols on phishing efficacy
Z Ma, J Reynolds, J Dickinson, K Wang, T Judd, JD Barnes, J Mason, ...
Stale TLS certificates: investigating precarious third-party access to valid TLS keys
Z Ma, A Faulkenberry, T Papastergiou, Z Durumeric, MD Bailey, ...
Proceedings of the 2023 ACM on Internet Measurement Conference, 222-235, 2023
View from above: exploring the malware ecosystem from the upper DNS hierarchy
A Faulkenberry, A Avgetidis, Z Ma, O Alrawi, C Lever, P Kintis, F Monrose, ...
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
Understanding the Trust Relationships of the Web PKI
Z Ma
University of Illinois at Urbana-Champaign, 2021
Practical Attacks Against DNS Reputation Systems
T Galloway, K Karakolios, Z Ma, R Perdisci, A Keromytis, M Antonakakis
2024 IEEE Symposium on Security and Privacy (SP), 233-233, 2024
The system can't perform the operation now. Try again later.
Articles 1–15