Login / Signup
Adam Oest
ORCID
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 23
Top Topics
Phishing Attacks
Social Media Platforms
Email
Countermeasures
Top Venues
USENIX Security Symposium
CoRR
IEEE Symposium on Security and Privacy
eCrime
</>
Publications
</>
Bhupendra Acharya
,
Dario Lazzaro
,
Efrén López-Morales
,
Adam Oest
,
Muhammad Saad
,
Antonio Emanuele Cinà
,
Lea Schönherr
,
Thorsten Holz
The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms.
USENIX Security Symposium
(2024)
Bhupendra Acharya
,
Muhammad Saad
,
Antonio Emanuele Cinà
,
Lea Schönherr
,
Hoang Dai Nguyen
,
Adam Oest
,
Phani Vadrevu
,
Thorsten Holz
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
CoRR
(2024)
Rana Pourmohamad
,
Steven Wirsz
,
Adam Oest
,
Tiffany Bao
,
Yan Shoshitaishvili
,
Ruoyu Wang
,
Adam Doupé
,
Rida A. Bazzi
Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry.
AsiaCCS
(2024)
Mehrnoosh Zaeifi
,
Faezeh Kalantari
,
Adam Oest
,
Zhibo Sun
,
Gail-Joon Ahn
,
Yan Shoshitaishvili
,
Tiffany Bao
,
Ruoyu Wang
,
Adam Doupé
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem.
CODASPY
(2024)
Yuba Raj Siwakoti
,
Manish Bhurtel
,
Danda B. Rawat
,
Adam Oest
,
RC Johnson
Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures.
IEEE Internet Things J.
10 (13) (2023)
Yixiao Gao
,
Muhammad Saad
,
Adam Oest
,
Jean Zhang
,
Bo Han
,
Songqing Chen
Can I Own Your NFTs? Understanding the New Attack Surface to NFTs.
IEEE Commun. Mag.
61 (9) (2023)
Marzieh Bitaab
,
Haehyun Cho
,
Adam Oest
,
Zhuoer Lyu
,
Wei Wang
,
Jorij Abraham
,
Ruoyu Wang
,
Tiffany Bao
,
Yan Shoshitaishvili
,
Adam Doupé
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale.
SP
(2023)
Dhruv Kuchhal
,
Muhammad Saad
,
Adam Oest
,
Frank Li
Evaluating the Security Posture of Real-World FIDO2 Deployments.
CCS
(2023)
Penghui Zhang
,
Zhibo Sun
,
Sukwha Kyung
,
Hans Walter Behrens
,
Zion Leonahenahe Basque
,
Haehyun Cho
,
Adam Oest
,
Ruoyu Wang
,
Tiffany Bao
,
Yan Shoshitaishvili
,
Gail-Joon Ahn
,
Adam Doupé
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
CCS
(2022)
Samin Yaseer Mahmud
,
K. Virgil English
,
Seaver Thorn
,
William Enck
,
Adam Oest
,
Muhammad Saad
Analysis of Payment Service Provider SDKs in Android.
ACSAC
(2022)
Dinil Mon Divakaran
,
Adam Oest
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review.
IEEE Secur. Priv.
20 (5) (2022)
Dinil Mon Divakaran
,
Adam Oest
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review.
CoRR
(2022)
Penghui Zhang
,
Adam Oest
,
Haehyun Cho
,
Zhibo Sun
,
RC Johnson
,
Brad Wardman
,
Shaown Sarker
,
Alexandros Kapravelos
,
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv.
20 (2) (2022)
Haehyun Cho
,
Jinbum Park
,
Adam Oest
,
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
ViK: practical mitigation of temporal memory safety violations through object ID inspection.
ASPLOS
(2022)
Penghui Zhang
,
Adam Oest
,
Haehyun Cho
,
Zhibo Sun
,
RC Johnson
,
Brad Wardman
,
Shaown Sarker
,
Alexandros Kapravelos
,
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing.
IEEE Symposium on Security and Privacy
(2021)
Sung Ta Dinh
,
Haehyun Cho
,
Kyle Martin
,
Adam Oest
,
Kyle Zeng
,
Alexandros Kapravelos
,
Gail-Joon Ahn
,
Tiffany Bao
,
Ruoyu Wang
,
Adam Doupé
,
Yan Shoshitaishvili
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
NDSS
(2021)
Zhibo Sun
,
Adam Oest
,
Penghui Zhang
,
Carlos E. Rubio-Medrano
,
Tiffany Bao
,
Ruoyu Wang
,
Ziming Zhao
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
USENIX Security Symposium
(2021)
Marzieh Bitaab
,
Haehyun Cho
,
Adam Oest
,
Penghui Zhang
,
Zhibo Sun
,
Rana Pourmohamad
,
Doowon Kim
,
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
CoRR
(2021)
Marzieh Bitaab
,
Haehyun Cho
,
Adam Oest
,
Penghui Zhang
,
Zhibo Sun
,
Rana Pourmohamad
,
Doowon Kim
,
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
eCrime
(2020)
Adam Oest
,
Penghui Zhang
,
Brad Wardman
,
Eric Nunes
,
Jakub Burgis
,
Ali Zand
,
Kurt Thomas
,
Adam Doupé
,
Gail-Joon Ahn
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
USENIX Security Symposium
(2020)
Adam Oest
,
Yeganeh Safaei
,
Penghui Zhang
,
Brad Wardman
,
Kevin Tyers
,
Yan Shoshitaishvili
,
Adam Doupé
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
USENIX Security Symposium
(2020)
Adam Oest
,
Yeganeh Safaei
,
Adam Doupé
,
Gail-Joon Ahn
,
Brad Wardman
,
Kevin Tyers
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
IEEE Symposium on Security and Privacy
(2019)
Adam Oest
,
Yeganeh Safaei
,
Adam Doupé
,
Gail-Joon Ahn
,
Brad Wardman
,
Gary Warner
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
eCrime
(2018)
Adam Oest
,
Manjeet Rege
Feedback-driven clustering for automated linking of web pages.
ICITST
(2013)
Adam Oest
,
Ivona Bezáková
,
James E. Heliotis
,
Sean Strout
Student development of board game strategies in a web-based graphical infrastructure (abstract only).
SIGCSE
(2013)
Ivona Bezáková
,
James E. Heliotis
,
Sean Strout
,
Adam Oest
,
Paul D. Solt
Programming board-game strategies in the introductory CS sequence (abstract only).
SIGCSE
(2012)