Biblio

Export 40 results:
Filters: Author is Vern Paxson  [Clear All Filters]
2023
Piet J, Sharma A, Paxson V, Wagner D.  2023.  Network Detection of Interactive SSH Impostors Using Deep Learning. 32nd USENIX Security Symposium (USENIX Security 23). :4283--4300.
2021
Ho G, Dhiman M, Akhawe D, Paxson V, Savage S, Voelker GM, Wagner D.  2021.  Hopper: Modeling and Detecting Lateral Movement. 30th USENIX Security Symposium (USENIX Security 21). :3093--3110.
2020
Chen J, Paxson V, Jiang J.  2020.  Composition Kills: A Case Study of Email Sender Authentication. 29th USENIX Security Symposium (USENIX Security 20). :2183--2199.
2019
Ho G, Cidon A, Gavish L, Schweighauser M, Paxson V, Savage S, Voelker GM, Wagner D.  2019.  Detecting and Characterizing Lateral Phishing at Scale. 28th USENIX Security Symposium (USENIX Security 19). :1273--1290.
2018
Tschantz MCarl, Afroz S, Sajid S, Qazi SAsif, Javed M, Paxson V.  2018.  A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18).
Chen J, Jiang J, Duan H, Wan T, Chen S, Paxson V, Yang M.  2018.  We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS. 27th USENIX Security Symposium (USENIX Security 18). :1079--1093.
2017
Singh R, Nithyanand R, Afroz S, Pearce P, Tschantz MCarl, Gill P, Paxson V.  2017.  Characterizing the Nature and Dynamics of Tor Exit Blocking. 26th USENIX Security Symposium (USENIX Security 17). :325--341.
Ho G, Sharma A, Javed M, Paxson V, Wagner D.  2017.  Detecting Credential Spearphishing in Enterprise Settings. 26th USENIX Security Symposium (USENIX Security 17). :469--485.
Pearce P, Jones B, Li F, Ensafi R, Feamster N, Weaver N, Paxson V.  2017.  Global Measurement of DNS Manipulation. 26th USENIX Security Symposium (USENIX Security 17). :307--323.
2016
Vallentin M, Paxson V, Sommer R.  2016.  VAST: A Unified Platform for Interactive Network Forensics. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :345--362.
Li F, Durumeric Z, Czyz J, Karami M, Bailey M, McCoy D, Savage S, Paxson V.  2016.  You've Got Vulnerability: Exploring Effective Vulnerability Notifications. 25th USENIX Security Symposium (USENIX Security 16). :1033--1050.
2015
Marczak B, Weaver N, Dalek J, Ensafi R, Fifield D, McKune S, Rey A, Scott-Railton J, Deibert R, Paxson V.  2015.  An Analysis of China’s “Great Cannon”. 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15).
2014
Kapravelos A, Grier C, Chachra N, Kruegel C, Vigna G, Paxson V.  2014.  Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd USENIX Security Symposium (USENIX Security 14). :641--654.
Marczak WR, Scott-Railton J, Marquis-Boire M, Paxson V.  2014.  When Governments Hack Opponents: A Look at Actors and Technology. 23rd USENIX Security Symposium (USENIX Security 14). :511--525.
2012
Thomas K, Grier C, Paxson V.  2012.  Adapting Social Spam Infrastructure for Political Censorship. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
Martignoni L, Poosankam P, Zaharia M, Han J, McCamant S, Song D, Paxson V, Perrig A, Shenker S, Stoica I.  2012.  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 2012 USENIX Annual Technical Conference (USENIX ATC 12). :165--182.
2011
Caballero J, Grier C, Kreibich C, Paxson V.  2011.  Measuring Pay-per-Install: The Commoditization of Malware Distribution. 20th USENIX Security Symposium (USENIX Security 11).
Weaver N, Kreibich C, Paxson V.  2011.  Redirecting DNS for Ads and Profit. USENIX Workshop on Free and Open Communications on the Internet (FOCI 11).
Kanich C, Weaver N, McCoy D, Halvorson T, Kreibich C, Levchenko K, Paxson V, Voelker GM, Savage S.  2011.  Show Me the Money: Characterizing Spam-advertised Revenue. 20th USENIX Security Symposium (USENIX Security 11).
2010
Cho CYuan, Caballero J, Grier C, Paxson V, Song D.  2010.  Insights from the Inside: A View of Botnet Management from Infiltration. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
Felegyhazi M, Kreibich C, Paxson V.  2010.  On the Potential of Proactive Domain Blacklisting. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
Nechaev B, Allman M, Paxson V, Gurtov A.  2010.  A Preliminary Analysis of TCP Performance in an Enterprise Network. 2010 Internet Network Management Workshop/Workshop on Research on Enterprise Networking (INM/WREN 10).

Pages