Geoffrey M. Voelker (original) (raw)
recent publications
Understanding the Efficacy of Phishing Training in Practice
Ho, Mirian, Luo, Tong, Lee, Liu, Longhurst, Dameff, Savage and Voelker. Oakland 2025
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
Liu, Kappos, Mugnier, Invernizzi, Savage, Tao, Thomas, Voelker and Meiklejohn. IMC 2024
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild
Izhikevich, Voelker, Savage and Izhikevich. EuroS&P 2024
Unfiltered: Measuring Cloud-based Email Filtering Bypasses
Rao, Liu, Ho, Voelker and Savage. WWW 2024
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates
Mirian, Ho, Savage and Voelker. ACSAC 2023
In the Line of Fire: Risks of DPI-triggered Data Collection
Mirian, Ukani, Foster, Akiwate, Halicioglu, Moore, Snoeren,Voelker and Stefan Savage. CSET 2023
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender
Liu, Sun, Bellon, Ho, Savage, Voelker and Munyaka. SOUPS 2023
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
Liu, Rao, Havron, Ho, Savage, Voelker and McCoy. PETS 2023
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy
Liu, Akiwate, Jonker, Mirian, Ho, Voelker and Savage. EuroS&P 2023
The Challenges of Blockchain-based Naming Systems for Malware Defenders
Randall, Hardaker, Schulman, Savage and Voelker. eCrime 2022
Retroactive Identification of Targeted DNS Infrastructure Hijacking
Akiwate, Sommese, Jonker, Durumeric, Claffy, Voelker and Savage. IMC 2022
Where .ru? Assessing the Impact of Conflict on Russian Domain Infrastructure
Jonker, Akiwate, Affinito, Claffy, Botta, Voelker, van Rijswijk-Deij and Savage. IMC 2022
Measuring UID Smuggling in the Wild
Randall, Snyder, Ukani, Snoeren, Voelker, Savage and Schulman. IMC 2022
Measuring Security Practices
DeKoven, Randall, Mirian, Akiwate, Blume, Saul, Schulman, Voelker and Savage. CACM 2022
Domain Name Lifetimes: Baseline and Threats
Affinito, Sommese, Akiwate, Savage, Claffy, Voelker, Botta and Jonker. TMA 2022
FaaSnap: FaaS Made Fast Using Snapshot-based VMs
Ao, Porter and Voelker. EuroSys 2022
Risky BIZness: Risks Derived from Registrar Name Management
Akiwate, Savage, Voelker and Claffy. IMC 2021
Who's Got Your Mail? Characterizing Mail Service Provider Usage
Liu, Akiwate, Jonker, Mirian, Savage and Voelker. IMC 2021
Home is Where the Hijacking is: Understanding DNS Interception by Residential Routers
Randall, Liu, Padmanabhan, Akiwate, Voelker, Savage and Schulman. IMC 2021
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure
Sommese, Akiwate, Jonker, Moura, Davids, van Rijswijk-Deij, Voelker, Savage, Claffy and Sperotto. TMA 2021
Hopper: Modeling and Detecting Lateral Movement
Ho, Dhiman, Akhawe, Paxson, Savage, Voelker and Wagner. USENIX Security 2021
Clairvoyance: Inferring Blocklist Use on the Internet
Li, Akiwate, Levchenko, Voelker and Savage. PAM 2021