Follow
Grant Ho
Grant Ho
Verified email at eng.ucsd.edu - Homepage
Title
Cited by
Cited by
Year
Smart locks: Lessons for securing commodity internet of things devices
G Ho, D Leung, P Mishra, A Hosseini, D Song, D Wagner
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
3112016
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1432015
Detecting credential spearphishing attacks in enterprise settings
G Ho, A Sharma, M Javed, V Paxson, D Wagner
Proc. of 26th USENIX Security, 2017
1222017
Detecting and characterizing lateral phishing at scale
G Ho, A Cidon, L Gavish, M Schweighauser, V Paxson, S Savage, ...
28th USENIX Security Symposium (USENIX Security 19), 1273-1290, 2019
752019
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
642016
Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics
G Ho
Technicalreport, StanfordUniversity 73, 74, 2014
402014
Tick Tock: Building Browser Red Pills from Timing Side Channels.
G Ho, D Boneh, L Ballard, N Provos
WOOT, 2014
252014
Driving 2FA adoption at scale: Optimizing two-factor authentication notification design patterns
M Golla, G Ho, M Lohmus, M Pulluri, EM Redmiles
30th USENIX Security Symposium, 109-126, 2021
222021
Hopper: Modeling and Detecting Lateral Movement.
G Ho, M Dhiman, D Akhawe, V Paxson, S Savage, GM Voelker, ...
USENIX Security Symposium, 3093-3110, 2021
82021
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts
N Shah, G Ho, M Schweighauser, M Ibrahim, A Cidon, D Wagner
Deployable Machine Learning for Security Defense: First International …, 2020
12020
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy
E Liu, G Akiwate, M Jonker, A Mirian, G Ho, GM Voelker, S Savage
arXiv preprint arXiv:2302.07287, 2023
2023
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
E Liu, S Rao, S Havron, G Ho, S Savage, GM Voelker, D McCoy
Proceedings on Privacy Enhancing Technologies 1, 1-18, 2023
2023
Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights
G Ho
University of California, Berkeley, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–13