default search action
Kevin Borgolte
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Ting-Han Chen, Carlotta Tagliaro, Martina Lindorfer, Kevin Borgolte, Jeroen van der Ham-de Vos:
Are You Sure You Want To Do Coordinated Vulnerability Disclosure? EuroS&P Workshops 2024: 307-314 - [c23]Carlotta Tagliaro, Martina Komsic, Andrea Continella, Kevin Borgolte, Martina Lindorfer:
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols. RAID 2024: 561-578 - [i7]Carlotta Tagliaro, Martina Komsic, Andrea Continella, Kevin Borgolte, Martina Lindorfer:
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols. CoRR abs/2405.09662 (2024) - 2023
- [j3]Bernardus Jansen, Natalia Kadenko, Dennis Broeders, Michel van Eeten, Kevin Borgolte, Tobias Fiebig:
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions. Gov. Inf. Q. 40(4): 101862 (2023) - [c22]David Schmidt, Carlotta Tagliaro, Kevin Borgolte, Martina Lindorfer:
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis. CCS 2023: 681-695 - 2021
- [c21]Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster:
Encryption without centralization: distributing DNS queries across recursive resolvers. ANRW 2021: 62-68 - [c20]Stijn Pletinckx, Kevin Borgolte, Tobias Fiebig:
Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale. CCS 2021: 21-35 - [c19]Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster:
Designing for Tussle in Encrypted DNS. HotNets 2021: 1-8 - [c18]Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster:
Can Encrypted DNS Be Fast? PAM 2021: 444-459 - [i6]Mannat Kaur, Michel van Eeten, Marijn Janssen, Kevin Borgolte, Tobias Fiebig:
Human Factors in Security Research: Lessons Learned from 2008-2018. CoRR abs/2103.13287 (2021) - 2020
- [c17]Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan R. Mayer:
Identifying Disinformation Websites Using Infrastructure Features. FOCI @ USENIX Security Symposium 2020 - [c16]Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster:
Comparing the Effects of DNS, DoT, and DoH on Web Performance. WWW 2020: 562-572 - [c15]Kevin Borgolte, Nick Feamster:
Understanding the Performance Costs and Benefits of Privacy-focused Browser Extensions. WWW 2020: 2275-2286 - [i5]Austin Hounsel, Kevin Borgolte, Paul Schmitt, Nick Feamster:
D-DNS: Towards Re-Decentralizing the DNS. CoRR abs/2002.09055 (2020) - [i4]Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan R. Mayer:
Supporting Early and Scalable Discovery of Disinformation Websites. CoRR abs/2003.07684 (2020) - [i3]Jordan Holland, Ross Teixeira, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, Jonathan R. Mayer:
Classifying Network Vendors at Internet Scale. CoRR abs/2006.13086 (2020) - [i2]Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster:
Measuring the Performance of Encrypted DNS Protocols from Broadband Access Networks. CoRR abs/2007.06812 (2020)
2010 – 2019
- 2019
- [c14]Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster:
Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern web. ANRW 2019: 20-22 - [i1]Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster:
Analyzing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web. CoRR abs/1907.08089 (2019) - 2018
- [b1]Kevin Borgolte:
Identifying and Preventing Large-scale Internet Abuse. University of California, Santa Barbara, USA, 2018 - [j2]Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Christopher Salls, Nick Stephens, Ruoyu Wang, Giovanni Vigna:
Mechanical Phish: Resilient Autonomous Hacking. IEEE Secur. Priv. 16(2): 12-22 (2018) - [c13]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. ANRW 2018: 4 - [c12]Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig:
Investigating System Operators' Perspective on Security Misconfigurations. CCS 2018: 1272-1289 - [c11]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. NDSS 2018 - [c10]Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna, Anja Feldmann:
In rDNS We Trust: Revisiting a Common Data-Source's Reliability. PAM 2018: 131-145 - [c9]Kevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna:
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. IEEE Symposium on Security and Privacy 2018: 770-784 - [c8]Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee:
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. USENIX Security Symposium 2018: 393-410 - 2017
- [c7]Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Something from Nothing (There): Collecting Global IPv6 Datasets from DNS. PAM 2017: 30-43 - 2015
- [j1]Mathias Payer, Ling Huang, Neil Zhenqiang Gong, Kevin Borgolte, Mario Frank:
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications. IEEE Trans. Inf. Forensics Secur. 10(1): 200-212 (2015) - [c6]Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna:
Drops for Stuff: An Analysis of Reshipping Mule Scams. CCS 2015: 1081-1092 - [c5]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Meerkat: Detecting Website Defacements through Image-based Object Recognition. USENIX Security Symposium 2015: 595-610 - 2014
- [c4]Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. RAID 2014: 276-298 - [c3]Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili:
Ten Years of iCTF: The Good, The Bad, and The Ugly. 3GSE 2014 - [c2]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Relevant change detection: a framework for the precise extraction of modified and novel web-based content as a filtering technique for analysis engines. WWW (Companion Volume) 2014: 595-598 - 2013
- [c1]Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Delta: automatic identification of unknown web-based infection campaigns. CCS 2013: 109-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint