default search action
Paul Pearce
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Abhishek Bhaskar, Paul Pearce:
Understanding Routing-Induced Censorship Changes Globally. CCS 2024: 437-451 - [c26]Grant Williams, Paul Pearce:
Seeds of Scanning: Exploring the Effects of Datasets, Methods, and Metrics on IPv6 Internet Scanning. IMC 2024: 295-313 - [c25]Zahra Yazdani, Paul Pearce, Alberto Dainotti, Cecilia Testart:
Poster: Investigating Network Security Post-Outage: Open Ports Vulnerabilities. IMC 2024: 783-784 - [c24]Amanda Hsu, Frank Li, Paul Pearce, Oliver Gasser:
A First Look at NAT64 Deployment In-The-Wild. PAM (1) 2024: 112-129 - [c23]Kevin Stevens, Mert Erdemir, Hang Zhang, Taesoo Kim, Paul Pearce:
BluePrint: Automatic Malware Signature Generation for Internet Scanning. RAID 2024: 197-214 - [c22]Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce:
6Sense: Internet-Wide IPv6 Scanning and its Security Applications. USENIX Security Symposium 2024 - [c21]Qinge Xie, Manoj Vignesh Kasi Murali, Paul Pearce, Frank Li:
Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content. USENIX Security Symposium 2024 - [i4]Abhishek Bhaskar, Paul Pearce:
Understanding Routing-Induced Censorship Changes Globally. CoRR abs/2406.19304 (2024) - 2023
- [j4]Amanda Hsu, Frank Li, Paul Pearce:
Fiat Lux: Illuminating IPv6 Apportionment with Different Datasets. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 21:1-21:24 (2023) - [c20]Amanda Hsu, Frank Li, Paul Pearce:
Fiat Lux: Illuminating IPv6 Apportionment with Different Datasets. SIGMETRICS (Abstracts) 2023: 47-48 - [c19]Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand:
Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild. USENIX Security Symposium 2023: 6221-6237 - [i3]Liz Izhikevich, Gautam Akiwate, Briana Berger, Spencer Drakontaidis, Anna Ascheman, Paul Pearce, David Adrian, Zakir Durumeric:
ZDNS: A Fast DNS Toolkit for Internet Measurement. CoRR abs/2309.13495 (2023) - [i2]Amanda Hsu, Frank Li, Paul Pearce, Oliver Gasser:
A First Look At NAT64 Deployment In-The-Wild. CoRR abs/2311.04181 (2023) - 2022
- [c18]ChangSeok Oh, Chris Kanich, Damon McCoy, Paul Pearce:
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. CCS 2022: 2401-2414 - [c17]Liz Izhikevich, Gautam Akiwate, Briana Berger, Spencer Drakontaidis, Anna Ascheman, Paul Pearce, David Adrian, Zakir Durumeric:
ZDNS: a fast DNS toolkit for internet measurement. IMC 2022: 33-43 - [c16]Abhishek Bhaskar, Paul Pearce:
Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement. USENIX Security Symposium 2022: 449-464 - [i1]Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand:
Glowing in the Dark Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild. CoRR abs/2210.02522 (2022) - 2021
- [c15]Teng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, Paul Pearce:
Deep Entity Classification: Abusive Account Detection for Online Social Networks. USENIX Security Symposium 2021: 4097-4114 - 2020
- [j3]Paul Glover, Paul Pearce:
Rapid assessment and review of simulation modelling. J. Simulation 14(2): 145-155 (2020) - [c14]Fedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, Ivan Ivanov:
Evaluating Changes to Fake Account Verification Systems. RAID 2020: 135-148 - [c13]Katriel Cohn-Gordon, Georgios Damaskinos, Divino Neto, Joshi Cordova, Benoît Reitz, Benjamin Strahs, Daniel Obenshain, Paul Pearce, Ioannis Papagiannis, Available Media:
DELF: Safeguarding deletion correctness in Online Social Networks. USENIX Security Symposium 2020
2010 – 2019
- 2019
- [c12]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - 2018
- [b1]Paul Pearce:
Methods and Systems for Understanding Large-Scale Internet Threats. University of California, Berkeley, USA, 2018 - [j2]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Toward Continual Measurement of Global Network-Level Censorship. IEEE Secur. Priv. 16(1): 24-33 (2018) - [c11]Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson:
Characterizing the Nature and Dynamics of Tor Exit Blocking. ANRW 2018: 23 - [c10]Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy:
Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem. USENIX Security Symposium 2018: 1043-1060 - 2017
- [j1]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global-Scale Measurement of DNS Manipulation. login Usenix Mag. 42(4) (2017) - [c9]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Augur: Internet-Wide Detection of Connectivity Disruptions. IEEE Symposium on Security and Privacy 2017: 427-443 - [c8]Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko:
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild. IEEE Symposium on Security and Privacy 2017: 770-787 - [c7]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global Measurement of DNS Manipulation. USENIX Security Symposium 2017: 307-323 - [c6]Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson:
Characterizing the Nature and Dynamics of Tor Exit Blocking. USENIX Security Symposium 2017: 325-341 - 2015
- [c5]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167 - 2014
- [c4]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - 2012
- [c3]Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner:
AdDroid: privilege separation for applications and advertisers in Android. AsiaCCS 2012: 71-72 - 2011
- [c2]Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson:
What's Clicking What? Techniques and Innovations of Today's Clickbots. DIMVA 2011: 164-183
2000 – 2009
- 2003
- [c1]Paul Pearce, Alan Robinson, Susan Wright:
The Wargame Infrastructure and Simulation Environment (Wise). KES 2003: 714-722
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint