Abstract is missing.
- BotSniffer: Detecting Botnet Command and Control Channels in Network TrafficGuofei Gu, Junjie Zhang, Wenke Lee. [doi]
- Measuring and Detecting Fast-Flux Service NetworksThorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling. [doi]
- PRECIP: Towards Practical and Retrofittable Confidential Information ProtectionXiaofeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi. [doi]
- Impeding Malware Analysis Using Conditional Code ObfuscationMonirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee. [doi]
- Taming the Devil: Techniques for Evaluating Anonymized Network DataScott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter. [doi]
- Automatic Protocol Format Reverse Engineering through Context-Aware Monitored ExecutionZhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang. [doi]
- HookFinder: Identifying and Understanding Malware Hooking BehaviorsHeng Yin, Zhenkai Liang, Dawn Song. [doi]
- Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution AuthorityDavid Dagon, Niels Provos, Christopher P. Lee, Wenke Lee. [doi]
- Halo: High-Assurance Locate for Distributed Hash TablesApu Kapadia, Nikos Triandopoulos. [doi]
- Exploiting Opportunistic Scheduling in Cellular Data NetworksRadmilo Racic, Denys Ma, Hao Chen, Xin Liu. [doi]
- Automatic Network Protocol AnalysisGilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda. [doi]
- Usable PIRPeter Williams, Radu Sion. [doi]
- Realizing Massive-Scale Conditional Access Systems Through Attribute-Based CryptosystemsPatrick Traynor, Kevin R. B. Butler, William Enck, Patrick McDaniel. [doi]
- Analysis-Resistant MalwareJohn Bethencourt, Dawn Song, Brent Waters. [doi]
- Robust Receipt-Free Election System with Ballot Secrecy and VerifiabilitySherman S. M. Chow, Joseph K. Liu, Duncan S. Wong. [doi]
- Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang. [doi]
- Automated Whitebox Fuzz TestingPatrice Godefroid, Michael Y. Levin, David A. Molnar. [doi]
- A Tune-up for Tor: Improving Security and Performance in the Tor NetworkRobin Snader, Nikita Borisov. [doi]
- Limits of Learning-based Signature Generation with AdversariesShobha Venkataraman, Avrim Blum, Dawn Song. [doi]
- A New Privacy-Enhanced Matchmaking ProtocolJi Sun Shin, Virgil D. Gligor. [doi]
- Analyzing Privacy in Enterprise Packet Trace AnonymizationBruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Donald F. Towsley. [doi]