Geoffrey M. Voelker (original) (raw)

recent publications

Understanding the Efficacy of Phishing Training in Practice
Ho, Mirian, Luo, Tong, Lee, Liu, Longhurst, Dameff, Savage and Voelker. Oakland 2025

Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
Liu, Kappos, Mugnier, Invernizzi, Savage, Tao, Thomas, Voelker and Meiklejohn. IMC 2024

Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild
Izhikevich, Voelker, Savage and Izhikevich. EuroS&P 2024

Unfiltered: Measuring Cloud-based Email Filtering Bypasses
Rao, Liu, Ho, Voelker and Savage. WWW 2024

An Empirical Analysis of Enterprise-Wide Mandatory Password Updates
Mirian, Ho, Savage and Voelker. ACSAC 2023

In the Line of Fire: Risks of DPI-triggered Data Collection
Mirian, Ukani, Foster, Akiwate, Halicioglu, Moore, Snoeren,Voelker and Stefan Savage. CSET 2023

Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender
Liu, Sun, Bellon, Ho, Savage, Voelker and Munyaka. SOUPS 2023

No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
Liu, Rao, Havron, Ho, Savage, Voelker and McCoy. PETS 2023

Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy
Liu, Akiwate, Jonker, Mirian, Ho, Voelker and Savage. EuroS&P 2023

The Challenges of Blockchain-based Naming Systems for Malware Defenders
Randall, Hardaker, Schulman, Savage and Voelker. eCrime 2022

Retroactive Identification of Targeted DNS Infrastructure Hijacking
Akiwate, Sommese, Jonker, Durumeric, Claffy, Voelker and Savage. IMC 2022

Where .ru? Assessing the Impact of Conflict on Russian Domain Infrastructure
Jonker, Akiwate, Affinito, Claffy, Botta, Voelker, van Rijswijk-Deij and Savage. IMC 2022

Measuring UID Smuggling in the Wild
Randall, Snyder, Ukani, Snoeren, Voelker, Savage and Schulman. IMC 2022

Measuring Security Practices
DeKoven, Randall, Mirian, Akiwate, Blume, Saul, Schulman, Voelker and Savage. CACM 2022

Domain Name Lifetimes: Baseline and Threats
Affinito, Sommese, Akiwate, Savage, Claffy, Voelker, Botta and Jonker. TMA 2022

FaaSnap: FaaS Made Fast Using Snapshot-based VMs
Ao, Porter and Voelker. EuroSys 2022

Risky BIZness: Risks Derived from Registrar Name Management
Akiwate, Savage, Voelker and Claffy. IMC 2021

Who's Got Your Mail? Characterizing Mail Service Provider Usage
Liu, Akiwate, Jonker, Mirian, Savage and Voelker. IMC 2021

Home is Where the Hijacking is: Understanding DNS Interception by Residential Routers
Randall, Liu, Padmanabhan, Akiwate, Voelker, Savage and Schulman. IMC 2021

Characterization of Anycast Adoption in the DNS Authoritative Infrastructure
Sommese, Akiwate, Jonker, Moura, Davids, van Rijswijk-Deij, Voelker, Savage, Claffy and Sperotto. TMA 2021

Hopper: Modeling and Detecting Lateral Movement
Ho, Dhiman, Akhawe, Paxson, Savage, Voelker and Wagner. USENIX Security 2021

Clairvoyance: Inferring Blocklist Use on the Internet
Li, Akiwate, Levchenko, Voelker and Savage. PAM 2021

More...