Biblio

Export 38 results:
Filters: Author is Vern Paxson  [Clear All Filters]
2020
Chen J, Paxson V, Jiang J.  2020.  Composition Kills: A Case Study of Email Sender Authentication. 29th {USENIX} Security Symposium ({USENIX} Security 20). :2183--2199.
2019
Ho G, Cidon A, Gavish L, Schweighauser M, Paxson V, Savage S, Voelker GM, Wagner D.  2019.  Detecting and Characterizing Lateral Phishing at Scale. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1273--1290.
2018
Tschantz MCarl, Afroz S, Sajid S, Qazi SAsif, Javed M, Paxson V.  2018.  A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. 8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 18).
Chen J, Jiang J, Duan H, Wan T, Chen S, Paxson V, Yang M.  2018.  We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS. 27th {USENIX} Security Symposium ({USENIX} Security 18). :1079--1093.
2017
Singh R, Nithyanand R, Afroz S, Pearce P, Tschantz MCarl, Gill P, Paxson V.  2017.  Characterizing the Nature and Dynamics of Tor Exit Blocking. 26th {USENIX} Security Symposium ({USENIX} Security 17). :325--341.
Ho G, Sharma A, Javed M, Paxson V, Wagner D.  2017.  Detecting Credential Spearphishing in Enterprise Settings. 26th {USENIX} Security Symposium ({USENIX} Security 17). :469--485.
Pearce P, Jones B, Li F, Ensafi R, Feamster N, Weaver N, Paxson V.  2017.  Global Measurement of DNS Manipulation. 26th {USENIX} Security Symposium ({USENIX} Security 17). :307--323.
2016
Vallentin M, Paxson V, Sommer R.  2016.  VAST: A Unified Platform for Interactive Network Forensics. 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). :345--362.
Li F, Durumeric Z, Czyz J, Karami M, Bailey M, McCoy D, Savage S, Paxson V.  2016.  You've Got Vulnerability: Exploring Effective Vulnerability Notifications. 25th {USENIX} Security Symposium ({USENIX} Security 16). :1033--1050.
2015
Marczak B, Weaver N, Dalek J, Ensafi R, Fifield D, McKune S, Rey A, Scott-Railton J, Deibert R, Paxson V.  2015.  An Analysis of China’s “Great Cannon”. 5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 15).
2014
Kapravelos A, Grier C, Chachra N, Kruegel C, Vigna G, Paxson V.  2014.  Hulk: Eliciting Malicious Behavior in Browser Extensions. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :641--654.
Marczak WR, Scott-Railton J, Marquis-Boire M, Paxson V.  2014.  When Governments Hack Opponents: A Look at Actors and Technology. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :511--525.
2012
Thomas K, Grier C, Paxson V.  2012.  Adapting Social Spam Infrastructure for Political Censorship. 5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 12).
Martignoni L, Poosankam P, Zaharia M, Han J, McCamant S, Song D, Paxson V, Perrig A, Shenker S, Stoica I.  2012.  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12). :165--182.
2011
Caballero J, Grier C, Kreibich C, Paxson V.  2011.  Measuring Pay-per-Install: The Commoditization of Malware Distribution. 20th {USENIX} Security Symposium ({USENIX} Security 11).
Weaver N, Kreibich C, Paxson V.  2011.  Redirecting DNS for Ads and Profit. {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 11).
Kanich C, Weaver N, Halvorson T, Kreibich C, Paxson V.  2011.  Show Me the Money: Characterizing Spam-advertised Revenue. 20th {USENIX} Security Symposium ({USENIX} Security 11).
2010
Cho CYuan, Caballero J, Grier C, Paxson V, Song D.  2010.  Insights from the Inside: A View of Botnet Management from Infiltration. 3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 10).
Felegyhazi M, Kreibich C, Paxson V.  2010.  On the Potential of Proactive Domain Blacklisting. 3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 10).
Nechaev B, Allman M, Paxson V, Gurtov A.  2010.  A Preliminary Analysis of TCP Performance in an Enterprise Network. 2010 Internet Network Management Workshop/Workshop on Research on Enterprise Networking (INM/WREN 10).
2009
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2009.  Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 09).
2008
Allman M, Kreibich C, Paxson V, Sommer R, Weaver N.  2008.  Principles for Developing Comprehensive Network Visibility. 3rd {USENIX} Workshop on Hot Topics in Security (HotSec 08).

Pages