USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 21 results:
Filters: Author is Niels Provos [Clear All Filters]
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. 25th USENIX Security Symposium (USENIX Security 16). :721--739.
.
2016. Trends and Lessons from Three Years Fighting Malicious Extensions. 24th USENIX Security Symposium (USENIX Security 15). :579--593.
.
2015. Tick Tock: Building Browser Red Pills from Timing Side Channels. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 10).
.
2010. All Your iFRAMEs Point to Us. 17th USENIX Security Symposium (USENIX Security 08).
.
2008. Closing Remarks. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
.
2008. To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. 17th USENIX Security Symposium (USENIX Security 08).
.
2008. The Ghost in the Browser: Analysis of Web-based Malware. First Workshop on Hot Topics in Understanding Botnets (HotBots 07).
.
2007. Cookies Along Trust-Boundaries (CAT)}}}}: Accurate and Deployable Flood Protection. 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06).
.
2006. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. Internet Measurement Conference 2005 (IMC 05).
.
2005. A Virtual Honeypot Framework. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. HONEYD, HONEYPOTS. 12th USENIX Security Symposium (USENIX Security 03).
.
2003. Preventing Privilege Escalation. 12th USENIX Security Symposium (USENIX Security 03).
.
2003. Defending Against Statistical Steganalysis. 10th USENIX Security Symposium (USENIX Security 01).
.
2001. ScanSSH: Scanning the Internet for SSH Servers. 15th Systems Administration Conference (LISA 2001).
.
2001. Analyzing the Overload Behavior of a Simple Web Server. 4th Annual Linux Showcase & Conference (ALS 2000).
.
2000. Encrypting Virtual Memory. 9th USENIX Security Symposium (USENIX Security 00).
.
2000. Scalable Network I/O in Linux. 2000 USENIX Annual Technical Conference (USENIX ATC 00).
.
2000. Cryptography in OpenBSD: An Overview. 1999 USENIX Annual Technical Conference (USENIX ATC 99).
.
1999. A Future-Adaptable Password Scheme. 1999 USENIX Annual Technical Conference (USENIX ATC 99).
.
1999.