LEET '13 | Attacker Economics for Internet-scale Vulnerability Risk Assessment | Luca Allodi |
LEET '13 | There Are No Free iPads: An Analysis of Survey Scams as a Business | Jason W. Clark, Damon McCoy |
LEET '13 | FuncTracker: Discovering Shared Code to Aid Malware Forensics | Charles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer |
LEET '13 | SinkMiner: Mining Botnet Sinkholes for Fun and Profit | Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon |
LEET '13 | Image Matching for Branding Phishing Kit Images | Chengcui Zhang, Rajan Kumar Kharel, Song Gao, Jason Britt |
LEET '13 | A View to a Kill: WebView Exploitation | Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer |
LEET '13 | Understanding the Emerging Threat of DDoS-as-a-Service | Mohammad Karami, Damon McCoy |
LEET '13 | The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security | Chuan Yue |
LEET '12 | Classification of UDP Traffic for DDoS Detection | Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth |
LEET '12 | Sherlock Holmes and the Case of the Advanced Persistent Threat | Ari Juels, Ting-Fang Yen |
LEET '12 | Observations on Emerging Threats | Paul Ferguson |
LEET '12 | Let's Parse to Prevent Pwnage | Mike Samuel, Ulfar Erlingsson |
LEET '12 | W32.Duqu: The Precursor to the Next Stuxnet | Eric Chien, Liam OMurchu, Nicolas Falliere |
LEET '12 | So You Want to Take Over a Botnet... | David Dittrich |
LEET '12 | Challenges in Network Application Identification | Alok Tongaonkar, Ram Keralapura, Antonio Nucci |
LEET '12 | Tracking DDoS Attacks: Insights into the Business of Disrupting the Web | Armin Büscher, Thorsten Holz |
LEET '12 | RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks | Yeongung Park, ChoongHyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-Je Cho |
LEET '12 | Clustering Potential Phishing Websites Using DeepMD5 | Jason Britt, Brad Wardman, Dr. Alan Sprague, Gary Warner |
LEET '12 | Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis | Tudor Dumitras, Petros Efstathopoulos |
LEET '12 | Key Challenges in Defending Against Malicious Socialbots | Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu |
LEET '12 | Adapting Social Spam Infrastructure for Political Censorship | Kurt Thomas, Chris Grier, Vern Paxson |
LEET '11 | Reconstructing Hash Reversal based Proof of Work Schemes | Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin, Carl A. Gunter |
LEET '11 | Andbot: Towards Advanced Mobile Botnets | Cui Xiang, Fang Binxing, Yin Lihua, Liu Xiaoyi, Zang Tianning |
LEET '11 | Exposing the Lack of Privacy in File Hosting Services | Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti |
LEET '11 | One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users | Stevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous |