Export 12 results:
Filters: Author is Roberto Perdisci  [Clear All Filters]
Pandit S, Sarker K, Perdisci R, Ahamad M, Yang D.  2023.  Combating Robocalls with Phone Virtual Assistant Mediated Interaction. 32nd USENIX Security Symposium (USENIX Security 23). :463--479.
Yang Z, Allen J, Landen M, Perdisci R, Lee W.  2023.  TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks. 32nd USENIX Security Symposium (USENIX Security 23). :6701--6718.
Nelms T, Perdisci R, Antonakakis M, Ahamad M.  2016.  Towards Measuring and Mitigating Social Engineering Software Download Attacks. 25th USENIX Security Symposium (USENIX Security 16). :773--789.
Nelms T, Perdisci R, Antonakakis M, Ahamad M.  2015.  WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths. 24th USENIX Security Symposium (USENIX Security 15). :1025--1040.
Nelms T, Perdisci R, Ahamad M.  2013.  ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. 22nd USENIX Security Symposium (USENIX Security 13). :589--604.
Rahbarinia B, Perdisci R, Antonakakis M, Dagon D.  2013.  SinkMiner: Mining Botnet Sinkholes for Fun and Profit. 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13).
Antonakakis M, Perdisci R, Lee W, Vasiloglou, II N, Dagon D.  2011.  Detecting Malware Domains at the Upper DNS Hierarchy. 20th USENIX Security Symposium (USENIX Security 11).
Perdisci R, Lee W, Feamster N.  2010.  Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a Dynamic Reputation System for DNS. 19th USENIX Security Symposium (USENIX Security 10).
Fogla P, Sharif M, Perdisci R, Kolesnikov O, Lee W.  2006.  Polymorphic Blending Attacks. 15th USENIX Security Symposium (USENIX Security 06).