Abstract is missing.
- Insights from the Inside: A View of Botnet Management from InfiltrationChia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song. [doi]
- Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet InfrastructureChris Nunnery, Greg Sinclair, Brent ByungHoon Kang. [doi]
- WebCop: Locating Neighborhoods of Malware on the WebJack W. Stokes, Reid Andersen, Christian Seifert, Kumar Chellapilla. [doi]
- Extending Black Domain Name List by Using Co-occurrence Relation between DNS QueriesKazumichi Sato, Keisuke Ishibashi, Tsuyoshi Toyono, Nobuhisa Miyake. [doi]
- DNS Prefetching and Its Privacy Implications: When Good Things Go BadFabian Monrose, Srinivas Krishnan. [doi]
- Honeybot, Your Man in the Middle for Automated Social EngineeringTobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda. [doi]
- Detection of Spam Hosts and Spam Bots Using Network Flow Traffic ModelingWilla K. Ehrlich, Anestis Karasaridis, David A. Hoeflin, Danielle Liu. [doi]
- The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus DistributionMoheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao. [doi]
- Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrentStevens Le-Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar. [doi]
- On the Potential of Proactive Domain BlacklistingMárk Félegyházi, Christian Kreibich, Vern Paxson. [doi]
- Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your ComputerStephen Checkoway, Hovav Shacham, Eric Rescorla. [doi]