Papers

Search results

    ConferenceTitleAuthor(s)
    LEET '13Attacker Economics for Internet-scale Vulnerability Risk AssessmentLuca Allodi
    LEET '13There Are No Free iPads: An Analysis of Survey Scams as a BusinessJason W. Clark, Damon McCoy
    LEET '13FuncTracker: Discovering Shared Code to Aid Malware ForensicsCharles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer
    LEET '13SinkMiner: Mining Botnet Sinkholes for Fun and ProfitBabak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon
    LEET '13Image Matching for Branding Phishing Kit ImagesChengcui Zhang, Rajan Kumar Kharel, Song Gao, Jason Britt
    LEET '13A View to a Kill: WebView ExploitationMatthias Neugschwandtner, Martina Lindorfer, Christian Platzer
    LEET '13Understanding the Emerging Threat of DDoS-as-a-ServiceMohammad Karami, Damon McCoy
    LEET '13The Devil Is Phishing: Rethinking Web Single Sign-On Systems SecurityChuan Yue
    LEET '12Classification of UDP Traffic for DDoS DetectionAlexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth
    LEET '12Sherlock Holmes and the Case of the Advanced Persistent ThreatAri Juels, Ting-Fang Yen
    LEET '12Observations on Emerging ThreatsPaul Ferguson
    LEET '12Let's Parse to Prevent PwnageMike Samuel, Ulfar Erlingsson
    LEET '12W32.Duqu: The Precursor to the Next StuxnetEric Chien, Liam OMurchu, Nicolas Falliere
    LEET '12So You Want to Take Over a Botnet...David Dittrich
    LEET '12Challenges in Network Application IdentificationAlok Tongaonkar, Ram Keralapura, Antonio Nucci
    LEET '12Tracking DDoS Attacks: Insights into the Business of Disrupting the WebArmin Büscher, Thorsten Holz
    LEET '12RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation AttacksYeongung Park, ChoongHyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-Je Cho
    LEET '12Clustering Potential Phishing Websites Using DeepMD5Jason Britt, Brad Wardman, Dr. Alan Sprague, Gary Warner
    LEET '12Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data AnalysisTudor Dumitras, Petros Efstathopoulos
    LEET '12Key Challenges in Defending Against Malicious SocialbotsYazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu
    LEET '12Adapting Social Spam Infrastructure for Political CensorshipKurt Thomas, Chris Grier, Vern Paxson
    LEET '11Reconstructing Hash Reversal based Proof of Work SchemesJeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin, Carl A. Gunter
    LEET '11Andbot: Towards Advanced Mobile BotnetsCui Xiang, Fang Binxing, Yin Lihua, Liu Xiaoyi, Zang Tianning
    LEET '11Exposing the Lack of Privacy in File Hosting ServicesNick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti
    LEET '11One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor UsersStevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous

Pages