Zakir Durumeric
Cited by
Cited by
Understanding the Mirai Botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX Security Symposium, 2017
The Matter of Heartbleed
Z Durumeric, F Li, J Kasten, N Weaver, J Amann, J Beekman, M Payer, ...
ACM Internet Measurement Conference (IMC), 2014
ZMap: Fast Internet-Wide Scanning and its Security Applications
Z Durumeric, E Wustrow, JA Halderman
22nd USENIX Security Symposium, 2013
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
22nd ACM Conference on Computer and Communications Security (CCS), 2015
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
N Heninger, Z Durumeric, E Wustrow, JA Halderman
21st USENIX Security Symposium, 2012
Censys: A Search Engine Backed by Internet-Wide Scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
22nd ACM Conference on Computer and Communications Security (CCS), 2015
Analysis of the HTTPS Certificate Ecosystem
Z Durumeric, J Kasten, M Bailey, JA Halderman
ACM Internet Measurement Conference (IMC), 2013
Security Analysis of the Estonian Internet Voting System
D Springall, T Finkenauer, Z Durumeric, J Kitcat, H Hursti, M MacAlpine, ...
21st ACM Conference on Computer and Communications Security (CCS), 2014
An Internet-Wide View of Internet-Wide Scanning
Z Durumeric, M Bailey, JA Halderman
23rd USENIX Security Symposium, 2014
The Security Impact of HTTPS Interception
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
24th Network and Distributed Systems Symposium (NDSS), 2017
All Things Considered: An Analysis of IoT Devices on Home Networks
D Kumar, K Shen, B Case, D Garg, G Alperovich, D Kuznetsov, R Gupta, ...
28th USENIX Security Symposium, 2019
Neither Snow Nor Rain Nor MITM... An Empirical Analysis of Email Delivery Security
Z Durumeric, D Adrian, A Mirian, J Kasten, E Bursztein, N Lidzborski, ...
ACM Internet Measurement Conference (IMC), 2015
You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications
F Li, Z Durumeric, J Czyz, M Karami, M Bailey, D McCoy, S Savage, ...
25th USENIX Security Symposium, 2016
Users Really Do Plug in USB Drives They Find
M Tischer, Z Durumeric, S Foster, S Duan, A Mori, E Bursztein, M Bailey
37th IEEE Symposium on Security & Privacy (Oakland), 2016
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web
J Aas, R Barnes, B Case, Z Durumeric, P Eckersley, A Flores-López, ...
ACM Conference on Computer and Communications Security (CCS), 2019
Towards a Complete View of the Certificate Ecosystem
B VanderSloot, J Amann, M Bernhard, Z Durumeric, M Bailey, ...
16th ACM Internet Measurement Conference (IMC), 2016
An Internet-Wide View of ICS Devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
14th IEEE Privacy, Security and Trust Conference (PST), 2016
Tracking Certificate Misissuance in the Wild
D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ...
39th IEEE Symposium on Security & Privacy (Oakland), 2018
Target Generation for Internet-wide IPv6 Scanning
A Murdock, F Li, P Bramsen, Z Durumeric, V Paxson
ACM Internet Measurement Conference (IMC'17), 2017
On the Mismanagement and Maliciousness of Networks
J Zhang, Z Durumeric, M Bailey, M Liu, M Karir
21st Network & Distributed System Security Symposium (NDSS’14), 2014
The system can't perform the operation now. Try again later.
Articles 1–20