Follow
Grant Ho
Grant Ho
Verified email at eng.ucsd.edu - Homepage
Title
Cited by
Cited by
Year
Smart locks: Lessons for securing commodity internet of things devices
G Ho, D Leung, P Mishra, A Hosseini, D Song, D Wagner
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
2662016
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1292015
Detecting credential spearphishing in enterprise settings
G Ho, A Sharma, M Javed, V Paxson, D Wagner
26th USENIX Security Symposium (USENIX Security 17), 469-485, 2017
1022017
Detecting and characterizing lateral phishing at scale
G Ho, A Cidon, L Gavish, M Schweighauser, V Paxson, S Savage, ...
28th USENIX Security Symposium (USENIX Security 19), 1273-1290, 2019
572019
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
572016
Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics
G Ho
Technicalreport, StanfordUniversity 73, 74, 2014
382014
Tick tock: building browser red pills from timing side channels
G Ho, D Boneh, L Ballard, N Provos
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
232014
Driving {2FA} Adoption at Scale: Optimizing {Two-Factor} Authentication Notification Design Patterns
M Golla, G Ho, M Lohmus, M Pulluri, EM Redmiles
30th USENIX Security Symposium (USENIX Security 21), 109-126, 2021
32021
Hopper: Modeling and detecting lateral movement
G Ho, M Dhiman, D Akhawe, V Paxson, S Savage, GM Voelker, D Wagner
30th USENIX Security Symposium (USENIX Security 21), 3093-3110, 2021
22021
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts
N Shah, G Ho, M Schweighauser, M Ibrahim, A Cidon, D Wagner
International Workshop on Deployable Machine Learning for Security Defense, 3-27, 2020
12020
Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights
G Ho
University of California, Berkeley, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–11