HotDep '08 | Reverse-Engineering Drivers for Safety and Portability | Vitaly Chipounov |
LEET '10 | Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure | Chris Nunnery, Greg Sinclair, Brent ByungHoon Kang |
LEET '10 | Insights from the Inside: A View of Botnet Management from Infiltration | Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song |
LEET '10 | The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution | Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao |
LEET '10 | Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent | Stevens Le Blond, Arnaud Legout, Fabrice Lefessant, Walid Dabbous, Mohamed Ali Kaafar |
LEET '10 | WebCop: Locating Neighborhoods of Malware on the Web | Jack W. Stokes, Reid Andersen, Christian Seifert, Kumar Chellapilla |
LEET '10 | On the Potential of Proactive Domain Blacklisting | Mark Felegyhazi, Christian Kreibich, Vern Paxson |
LEET '10 | Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling | Willa K. Ehrlich, Anestis Karasaridis, David Hoeflin, Danielle Liu |
LEET '10 | Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries | Kazumichi Sato, Keisuke Ishibashi, Tsuyoshi Toyono, Nobuhisa Miyake |
LEET '10 | Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer | Stephen Checkoway, Hovav Shacham, Eric Rescorla |
LEET '10 | DNS Prefetching and Its Privacy Implications: When Good Things Go Bad | Fabian Monrose, Srinivas Krishnan |
LEET '10 | Honeybot, Your Man in the Middle for Automated Social Engineering | Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda |
IPTPS '10 | Blindfold: A System to "See No Evil" in Content Discovery | Ryan S. Peterson, Bernard Wong, Emin Gün Sirer |
IPTPS '10 | AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets | Zhi Yang, Ben Y. Zhao, Yuanjian Xing, Song Ding, Feng Xiao, Yafei Dai |
IPTPS '10 | Peer-to-Peer Bargaining in Container-Based Datacenters | Yuan Feng, Baochun Li, Bo Li |
IPTPS '10 | Estimating Peer Similarity using Distance of Shared Files | Yuval Shavitt, Ela Weinsberg, Udi Weinsberg |
IPTPS '10 | Don't Love Thy Nearest Neighbor | Cristian Lumezanu, Dave Levin, Bo Han, Neil Spring, Bobby Bhattacharjee |
IPTPS '10 | SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks | Pericles Lopes, Ronaldo A. Ferreira |
IPTPS '10 | Balancing Gossip Exchanges in Networks with Firewalls | João Leitão, Robbert van Renesse, Luís Rodrigues |
IPTPS '10 | A Middleware for Gossip Protocols | Michael Chow |
IPTPS '10 | StAN: Exploiting Shared Interests without Disclosing Them in Gossip-based Publish/Subscribe | Miguel Matos, Ana Nunes, Rui Oliveira, José Pereira |
IPTPS '10 | Public and Private BitTorrent Communities: A Measurement Study | M. Meulpolder, L. D'Acunto, M. Capotă, M. Wojciechowski, J.A. Pouwelse, D.H.J. Epema, H.J. Sips |
IPTPS '10 | Comparing BitTorrent Clients in the Wild: The Case of Download Speed | Marios Iliofotou, Georgos Siganos, Xiaoyuan Yang, Pablo Rodriguez |
IPTPS '10 | Power-law Revisited: A Large Scale Measurement Study of P2P Content Popularity | György Dán, Niklas Carlsson |
IPTPS '10 | Strange Bedfellows: Community Identification in BitTorrent | David Choffnes, Luís A. Nunes Amaral, Dean Malmgren, Jordi Duch, Roger Guiermà, Fabián Bustamante |