Understanding Server-side Commercial Fingerprinting, Elisa Luo, Tom Ritter, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of the Web Conference (WWW), Dubai, UAE, May 2026.
TickTock: Verified Isolation in a Production Embedded OS, Vivien Rindisbacher, Evan Johnson, Nico Lehmann, Tyler Potyondy, Pat Pannuto, Stefan Savage, Deian Stefan, and Ranjit Jhala,
Proceedings of the 31st ACM Symposium on Operating Systems Principles (SOSP), Seoul, Republic of Korea, October 2025.
Don’t Look Up: There Are Sensitive Internal Links in the Clear on GEOSatellites, Wenyi Zhang, Annie Dai, Keegan Ryan, Dave Levin, Nadia Heninger, and Aaron Schulman,
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Taipei, Taiwan, October 2025.
Local Frames: Exploiting Inherited Origins to Bypass Content Blockers, Alisha Ukani, Hamed Haddadi, Alex C. Snoeren, and Peter Snyder,
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Taipei, Taiwan, October 2025.
Canvassing the Fingerprinters: Characterizing Canvas Fingerprinting Use Across the Web, Elisa Luo, Tom Ritter, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of the ACM Internet Measurement Conference (IMC), Madison, Wisconsin, October 2025.
Somesite I Used To Crawl: Awareness, Agency and Efficacy in Protecting Content Creators From AI Crawlers, Enze Liu, Elisa Luo, Shawn Shan, Geoffrey M. Voelker, Ben Y. Zhao, and Stefan Savage,
Proceedings of the ACM Internet Measurement Conference (IMC), Madison, Wisconsin, October 2025.
No Key, No Problem: Vulnerabilities in Master Lock Smart Locks, Chengsong Diao, Danielle Dang, Sierra Lira, Angela Tsai, Miro Haller, and Nadia Heninger,
Proceedings of the USENIX WOOT Conference on Offensive Technologies (WOOT), Seattle, WA, August 2025.
Characterizing the MrDeepFakes Sexual Deepfake Marketplace, Catherine Han, Anne Li, Deepak Kumar, and Zakir Durumeric,
Proceedings of the USENIX Security Symposium, Seattle, WA, August 2025.
Patient Care Technology Disruptions Associated With the CrowdStrike Outage, Jeffrey L. Tully, Sumanth Rao, Isabel Straw, Rodney A. Gabriel, Chris Longhurst, Stefan Savage, Geoffrey M. Voelker, and Christian J. Dameff,
JAMA Network Open 8(7):e2530226-e2530226, July 2025.
From Scarcity to Opportunity: Examining Abuse of the IPv4 Leasing Market, Bernhard Degen, Ben Du, Ricky K. P. Mok, Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, and kc claffy.,
Proceedings of the 6th Network Traffic Measurement and Analysis Conference (TMA), June 2025.
Understanding the Efficacy of Phishing Training in Practice, Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of the IEEE Symposium on Security and Privacy, May 2025.
Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters, Mihir Bellare, Doreen Riepel, and Laura Shea,
Proceedings of PKC 2025, May 2025.
Public-Algorithm Substitution Attacks: Subverting Hashing and Verification, Mihir Bellare, Doreen Riepel, and Laura Shea,
Proceedings of PKC 2025, May 2025.
An Empirical Analysis on the Use and Reporting of National Security Letters, Alex Bellon, Miro Haller, Andrey Labunets, Enze Liu, and Stefan Savage,
Proceedings of ACM Sympoisum on Computer Science and Law (CSLAW), Munich, Germany, March 2025.
Characterizing the Networks Sending Enterprise Phishing Emails, Elisa Luo, Liane Young, Grant Ho, M. H. Afifi, Marco Schweighauser, Ethan Katz-Bassett, and Asaf Cidon,
Proceedings of the Passive and Active Measurement Conference (PAM), Virtual, March 2025.