USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 40 results:
Filters: Author is Vern Paxson [Clear All Filters]
Network Detection of Interactive SSH Impostors Using Deep Learning. 32nd USENIX Security Symposium (USENIX Security 23). :4283--4300.
.
2023. Hopper: Modeling and Detecting Lateral Movement. 30th USENIX Security Symposium (USENIX Security 21). :3093--3110.
.
2021. Composition Kills: A Case Study of Email Sender Authentication. 29th USENIX Security Symposium (USENIX Security 20). :2183--2199.
.
2020. Detecting and Characterizing Lateral Phishing at Scale. 28th USENIX Security Symposium (USENIX Security 19). :1273--1290.
.
2019. A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18).
.
2018. We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS. 27th USENIX Security Symposium (USENIX Security 18). :1079--1093.
.
2018. Characterizing the Nature and Dynamics of Tor Exit Blocking. 26th USENIX Security Symposium (USENIX Security 17). :325--341.
.
2017. Detecting Credential Spearphishing in Enterprise Settings. 26th USENIX Security Symposium (USENIX Security 17). :469--485.
.
2017. Global Measurement of DNS Manipulation. 26th USENIX Security Symposium (USENIX Security 17). :307--323.
.
2017. VAST: A Unified Platform for Interactive Network Forensics. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :345--362.
.
2016. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. 25th USENIX Security Symposium (USENIX Security 16). :1033--1050.
.
2016. An Analysis of China’s “Great Cannon”. 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15).
.
2015. Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd USENIX Security Symposium (USENIX Security 14). :641--654.
.
2014. When Governments Hack Opponents: A Look at Actors and Technology. 23rd USENIX Security Symposium (USENIX Security 14). :511--525.
.
2014. Practical Comprehensive Bounds on Surreptitious Communication over DNS. 22nd USENIX Security Symposium (USENIX Security 13). :17--32.
.
2013. Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion. 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13).
.
2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. 22nd USENIX Security Symposium (USENIX Security 13). :195--210.
.
2013. Adapting Social Spam Infrastructure for Political Censorship. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
.
2012. Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 2012 USENIX Annual Technical Conference (USENIX ATC 12). :165--182.
.
2012. Measuring Pay-per-Install: The Commoditization of Malware Distribution. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Redirecting DNS for Ads and Profit. USENIX Workshop on Free and Open Communications on the Internet (FOCI 11).
.
2011. Show Me the Money: Characterizing Spam-advertised Revenue. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Insights from the Inside: A View of Botnet Management from Infiltration. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. On the Potential of Proactive Domain Blacklisting. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. A Preliminary Analysis of TCP Performance in an Enterprise Network. 2010 Internet Network Management Workshop/Workshop on Research on Enterprise Networking (INM/WREN 10).
.
2010.