Sok: Fraud in telephony networks M Sahin, A Francillon, P Gupta, M Ahamad 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 235-250, 2017 | 84 | 2017 |
Using chatbots against voice spam: Analyzing Lenny’s effectiveness M Sahin, M Relieu, A Francillon Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 2017 | 41 | 2017 |
Over-The-Top Bypass: Study of a Recent Telephony Fraud M Sahin, A Francillon ACM SIGSAC Conference on Computer and Communications Security, 1106--1117, 2016 | 25 | 2016 |
Une approche configurationnelle des leurres conversationnels M Relieu, M Sahin, A Francillon Réseaux, 81-111, 2020 | 9 | 2020 |
Lenny the bot as a resource for sequential analysis: exploring the treatment of Next Turn Repair Initiation in the beginnings of unsolicited calls M Relieu, M Sahin, A Francillon Gesellschaft für Informatik eV, 2019 | 9 | 2019 |
Understanding and Detecting International Revenue Share Fraud M Sahin, A Francillon NDSS, 2021 | 8 | 2021 |
Lessons Learned from SunDEW: A Self Defense Environment for Web Applications M Sahin, C Hebert, AS de Oliveira MADWeb Workshop at NDSS'20, 2020 | 8 | 2020 |
Understanding Telephony Fraud as an Essential Step to Better Fight It M SAHIN TELECOM ParisTech, 2017 | 8* | 2017 |
Identifier-based application security C Hebert, M Sahin, AS de Oliveira US Patent 11,425,166, 2022 | 6 | 2022 |
Measuring developers’ web security awareness from attack and defense perspectives M Sahin, T Ünlü, C Hebert, LA Shepherd, N Coull, C Mc Lean 2022 IEEE Security and Privacy Workshops (SPW), 31-43, 2022 | 6 | 2022 |
A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence JMK Luca Compagna, Hugo Jonker, Benjamin Krumnow, Merve Sahin In Proc. 2nd Workshop on Designing Security for the Web (SecWeb’21). IEEE …, 2021 | 6* | 2021 |
On the Effectiveness of the National Do-Not-Call Registries M Sahin, A Francillon Workshop on Technology and Consumer Protection (ConPro ’18) co-located with …, 2018 | 5 | 2018 |
An approach to generate realistic HTTP parameters for application layer deception M Sahin, C Hébert, R Cabrera Lozoya International Conference on Applied Cryptography and Network Security, 337-355, 2022 | 3 | 2022 |
Application security through deceptive authentication C Hebert, AS de Oliveira, M Sahin US Patent App. 17/034,487, 2022 | 3 | 2022 |
IRSF: a Billion $ Fraud Abusing International Premium Rate Numbers M Sahin, A Francillon EURECOM, 2018 | 2 | 2018 |
The Hitchhiker's Guide to Malicious Third-Party Dependencies P Ladisa, M Sahin, SE Ponta, M Rosa, M Martinez, O Barais Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research …, 2023 | 1 | 2023 |
Automatic generation of deceptive API endpoints C Hebert, M Sahin, AS de Oliveira, RC Lozoya, A Mhedhbi US Patent 11,729,213, 2023 | 1 | 2023 |
Application security through multi-factor fingerprinting C Hebert, A Palmieri, M Sahin, AS de Oliveira US Patent 11,539,742, 2022 | 1 | 2022 |
Collaborative application security C Hebert, M Sahin, AS de Oliveira US Patent 11,429,716, 2022 | 1 | 2022 |
A configurational approach to conversational lures M Relieu, M Sahin, A Francillon Réseaux 220221 (2), 81-111, 2020 | 1 | 2020 |