Nowdays, my students present the vast majority of our work at academic conferences. Links to these recordings can typically be found on the webpages of individual conferences.
Below, you can find the recordings of selected invited lectures and presentations of our work to different audiences, such as, CISOs, developers, etc.
|Topics||phishing, network security, fingerprinting|
|Based on:||Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits, CCS 2021 (PDF)|
|Topics||mobile security, UI attacks, security mechanisms, proxies|
|Organizer||UK Security and Privacy Seminar Series|
|Topics||bot detection, honeypots, fingerprinting, network security|
|Based on:||Good Bot, Bad Bot: Characterizing Automated Browsing Activity, IEEE S&P 2021 (PDF)|
|Topics||browser fingerprinting, browser extensions, privacy|
|Topics||tech support scams, web security, large-scale detection, deception|
|Organizer||CyLab, Carnegie Mellon University|
|Based on:||Dial One for Scam: A Large-Scale Analysis of Technical Support Scams, NDSS 2017 (PDF)|