researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2009
2010
2011
2012
2013
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Alan Sprague
Alexandru G. Bardas
Alfonso Valdes
Alok Tongaonkar
Anestis Karasaridis
Arnaud Legout
Chris Grier
Christian Kreibich
Damon McCoy
Davide Balzarotti
Engin Kirda
Geoffrey M. Voelker
Jason Britt
Kirill Levchenko
Mohamed Ali Kâafar
Márk Félegyházi
Stevens Le-Blond
Thorsten Holz
Vern Paxson
Walid Dabbous
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
april
attacks
botnet
ddos
detection
emergent
exploits
large
leet
malware
phishing
scale
spam
threats
usa
usenix
using
web
workshop
LEET (leet)
Editions
Publications
Viewing Publication 1 - 57 from 57
2013
Attacker Economics for Internet-scale Vulnerability Risk Assessment
Luca Allodi
.
leet 2013
:
[doi]
There Are No Free iPads: An Analysis of Survey Scams as a Business
Jason W. Clark
,
Damon McCoy
.
leet 2013
:
[doi]
Understanding the Emerging Threat of DDoS-as-a-Service
Mohammad Karami
,
Damon McCoy
.
leet 2013
:
[doi]
FuncTracker: Discovering Shared Code to Aid Malware Forensics
Charles LeDoux
,
Arun Lakhotia
,
Craig Miles
,
Vivek Notani
,
Avi Pfeffer
.
leet 2013
:
[doi]
A View to a Kill: WebView Exploitation
Matthias Neugschwandtner
,
Martina Lindorfer
,
Christian Platzer
.
leet 2013
:
[doi]
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013
Vern Paxson
, editor,
USENIX Association,
2013.
[doi]
SinkMiner: Mining Botnet Sinkholes for Fun and Profit
Babak Rahbarinia
,
Roberto Perdisci
,
Manos Antonakakis
,
David Dagon
.
leet 2013
:
[doi]
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security
Chuan Yue
.
leet 2013
:
[doi]
Image Matching for Branding Phishing Kit Images
Chengcui Zhang
,
Rupak Kharel
,
Song Gao
,
Jason Britt
.
leet 2013
:
[doi]
2012
Classification of UDP Traffic for DDoS Detection
Alexandru G. Bardas
,
Loai Zomlot
,
Sathya Chandran Sundaramurthy
,
Xinming Ou
,
S. Raj Rajagopalan
,
Marc R. Eisenbarth
.
leet 2012
:
[doi]
Key Challenges in Defending Against Malicious Socialbots
Yazan Boshmaf
,
Ildar Muslukhov
,
Konstantin Beznosov
,
Matei Ripeanu
.
leet 2012
:
[doi]
Clustering Potential Phishing Websites Using DeepMD5
Jason Britt
,
Brad Wardman
,
Alan Sprague
,
Gary Warner
.
leet 2012
:
[doi]
Tracking DDoS Attacks: Insights into the Business of Disrupting the Web
Armin Büscher
,
Thorsten Holz
.
leet 2012
:
[doi]
W32.Duqu: The Precursor to the Next Stuxnet
Eric Chien
,
Liam O'Murchu
,
Nicolas Falliere
.
leet 2012
:
[doi]
So You Want to Take Over a Botnet..
David Dittrich
.
leet 2012
:
[doi]
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis
Tudor Dumitras
,
Petros Efstathopoulos
.
leet 2012
:
[doi]
Observations on Emerging Threats
Paul Ferguson
.
leet 2012
:
[doi]
Sherlock Holmes and the Case of the Advanced Persistent Threat
Ari Juels
,
Ting-Fang Yen
.
leet 2012
:
[doi]
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012
Engin Kirda
, editor,
USENIX Association,
2012.
[doi]
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks
Yeongung Park
,
Choonghyun Lee
,
Chanhee Lee
,
JiHyeog Lim
,
Sangchul Han
,
Minkyu Park
,
Seongje Cho
.
leet 2012
:
[doi]
Let's Parse to Prevent Pwnage
Mike Samuel
,
Úlfar Erlingsson
.
leet 2012
:
[doi]
Adapting Social Spam Infrastructure for Political Censorship
Kurt Thomas
,
Chris Grier
,
Vern Paxson
.
leet 2012
:
[doi]
Challenges in Network Application Identification
Alok Tongaonkar
,
Ram Keralapura
,
Antonio Nucci
.
leet 2012
:
[doi]
2011
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software
Mohammed I. Al-Saleh
,
Jedidiah R. Crandall
.
leet 2011
:
[doi]
Andbot: Towards Advanced Mobile Botnets
Xiang Cui
,
Binxing Fang
,
Lihua Yin
,
Xiaoyi Liu
,
Tianning Zang
.
leet 2011
:
[doi]
Reconstructing Hash Reversal based Proof of Work Schemes
Jeff Green
,
Joshua Juen
,
Omid Fatemieh
,
Ravinder Shankesi
,
Dong (Kevin) Jin
,
Carl A. Gunter
.
leet 2011
:
[doi]
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm
Nathaniel Husted
,
Steven Myers
.
leet 2011
:
[doi]
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011
Christopher Kruegel
, editor,
USENIX Association,
2011.
[doi]
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
Stevens Le-Blond
,
Pere Manils
,
Chaabane Abdelberi
,
Mohamed Ali Kâafar
,
Claude Castelluccia
,
Arnaud Legout
,
Walid Dabbous
.
leet 2011
:
[doi]
On the Effects of Registrar-level Intervention
He Liu
,
Kirill Levchenko
,
Márk Félegyházi
,
Christian Kreibich
,
Gregor Maier
,
Geoffrey M. Voelker
.
leet 2011
:
[doi]
Exposing the Lack of Privacy in File Hosting Services
Nick Nikiforakis
,
Marco Balduzzi
,
Steven Van Acker
,
Wouter Joosen
,
Davide Balzarotti
.
leet 2011
:
[doi]
The Nuts and Bolts of a Forum Spam Automator
Youngsang Shin
,
Minaxi Gupta
,
Steven A. Myers
.
leet 2011
:
[doi]
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns
Brett Stone-Gross
,
Thorsten Holz
,
Gianluca Stringhini
,
Giovanni Vigna
.
leet 2011
:
[doi]
Characterizing Internet Worm Infection Structure
Qian Wang
,
Zesheng Chen
,
Chao Chen
.
leet 2011
:
[doi]
Inflight Modifications of Content: Who Are the Culprits?
Chao Zhang
,
Cheng Huang
,
Keith W. Ross
,
David A. Maltz
,
Jin Li 0001
.
leet 2011
:
[doi]
2010
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '10, San Jose, CA, USA, April 27, 2010
Michael Bailey
, editor,
USENIX Association,
2010.
[doi]
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer
Stephen Checkoway
,
Hovav Shacham
,
Eric Rescorla
.
leet 2010
:
[doi]
Insights from the Inside: A View of Botnet Management from Infiltration
Chia Yuan Cho
,
Juan Caballero
,
Chris Grier
,
Vern Paxson
,
Dawn Song
.
leet 2010
:
[doi]
Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling
Willa K. Ehrlich
,
Anestis Karasaridis
,
David A. Hoeflin
,
Danielle Liu
.
leet 2010
:
[doi]
On the Potential of Proactive Domain Blacklisting
Márk Félegyházi
,
Christian Kreibich
,
Vern Paxson
.
leet 2010
:
[doi]
Honeybot, Your Man in the Middle for Automated Social Engineering
Tobias Lauinger
,
Veikko Pankakoski
,
Davide Balzarotti
,
Engin Kirda
.
leet 2010
:
[doi]
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
Stevens Le-Blond
,
Arnaud Legout
,
Fabrice Le Fessant
,
Walid Dabbous
,
Mohamed Ali Kâafar
.
leet 2010
:
[doi]
DNS Prefetching and Its Privacy Implications: When Good Things Go Bad
Fabian Monrose
,
Srinivas Krishnan
.
leet 2010
:
[doi]
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure
Chris Nunnery
,
Greg Sinclair
,
Brent ByungHoon Kang
.
leet 2010
:
[doi]
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution
Moheeb Abu Rajab
,
Lucas Ballard
,
Panayiotis Mavrommatis
,
Niels Provos
,
Xin Zhao
.
leet 2010
:
[doi]
Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries
Kazumichi Sato
,
Keisuke Ishibashi
,
Tsuyoshi Toyono
,
Nobuhisa Miyake
.
leet 2010
:
[doi]
WebCop: Locating Neighborhoods of Malware on the Web
Jack W. Stokes
,
Reid Andersen
,
Christian Seifert
,
Kumar Chellapilla
.
leet 2010
:
[doi]
2009
A View on Current Malware Behaviors
Ulrich Bayer
,
Imam Habibi
,
Davide Balzarotti
,
Engin Kirda
.
leet 2009
:
[doi]
Malware Characterization through Alert Pattern Discovery
Steven Cheung
,
Alfonso Valdes
.
leet 2009
:
[doi]
Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches
Márk Jelasity
,
Vilmos Bilicki
.
leet 2009
:
[doi]
Spamcraft: An Inside Look At Spam Campaign Orchestration
Christian Kreibich
,
Chris Kanich
,
Kirill Levchenko
,
Brandon Enright
,
Geoffrey M. Voelker
,
Vern Paxson
,
Stefan Savage
.
leet 2009
:
[doi]
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '09, Boston, MA, USA, April 21, 2009
Wenke Lee
, editor,
USENIX Association,
2009.
[doi]
Temporal Correlations between Spam and Phishing Websites
Tyler Moore
,
Richard Clayton
.
leet 2009
:
[doi]
PhoneyC: A Virtual Client Honeypot
Jose Nazario
.
leet 2009
:
[doi]
An Empirical Study of Real-world Polymorphic Code Injection Attacks
Michalis Polychronakis
,
Kostas G. Anagnostakis
.
leet 2009
:
[doi]
A Foray into Conficker's Logic and Rendezvous Points
Phillip A. Porras
,
Hassen Saïdi
.
leet 2009
:
[doi]
peHash: A Novel Approach to Fast Malware Clustering
Georg Wicherski
.
leet 2009
:
[doi]
Sign in
or
sign up
to see more results.