Abstract is missing.
- Exposing the Lack of Privacy in File Hosting ServicesNick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti. [doi]
- Characterizing Internet Worm Infection StructureQian Wang, Zesheng Chen, Chao Chen. [doi]
- Why Mobile-to-Mobile Wireless Malware Won't Cause a StormNathaniel Husted, Steven Myers. [doi]
- Inflight Modifications of Content: Who Are the Culprits?Chao Zhang, Cheng Huang, Keith W. Ross, David A. Maltz, Jin Li 0001. [doi]
- The Nuts and Bolts of a Forum Spam AutomatorYoungsang Shin, Minaxi Gupta, Steven A. Myers. [doi]
- On the Effects of Registrar-level InterventionHe Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker. [doi]
- One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor UsersStevens Le-Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous. [doi]
- The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam CampaignsBrett Stone-Gross, Thorsten Holz, Gianluca Stringhini, Giovanni Vigna. [doi]
- Andbot: Towards Advanced Mobile BotnetsXiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang. [doi]
- Reconstructing Hash Reversal based Proof of Work SchemesJeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter. [doi]
- Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus SoftwareMohammed I. Al-Saleh, Jedidiah R. Crandall. [doi]