USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 33 results:
Filters: Author is Thorsten Holz [Clear All Filters]
Static Detection of Second-Order Vulnerabilities in Web Applications. 23rd USENIX Security Symposium (USENIX Security 14). :989--1003.
.
2014. B@bel: Leveraging Email Delivery for Spam Mitigation. 21st USENIX Security Symposium (USENIX Security 12). :16--32.
.
2012. Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
.
2012. BOTMAGNIFIER: Locating Spambots on the Internet. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
.
2011. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
.
2008. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. First Workshop on Hot Topics in Understanding Botnets (HotBots 07).
.
2007.