Publications
Conference Publications
I Can SE Clearly Now: Investigating the Effectiveness of GUI-based Symbolic Execution for Software Vulnerability Discovery
Easy As Child's Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem
Nothing Personal: Understanding the Theft, Spread, and Use of Personally Identifiable Information in the Financial Ecosystem
I'm Spartacus, No, I'm Spartacus: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
Scam Pandemic: How Attackers Exploit Public Fear through Phishing
Understanding and Detecting Private Interactions in Underground Forums
Towards Automated Threat Intelligence Fusion
Migrating GIS Big Data Computing from Hadoop to Spark: An Exemplary Study Using Twitter
DART: A Geographic Information System on Hadoop
Effects on Performance of Analytical Tools for Visually Demanding Tasks through Direct and Indirect Touch Interaction in an Immersive Visualization
Journal Publications
A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing