Papers

Search results

    ConferenceTitleAuthor(s)
    LEET '11On the Effects of Registrar-level InterventionHe (Lonnie) Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker
    LEET '11Characterizing Internet Worm Infection StructureQian Wang, Zesheng Chen, Chao Chen
    LEET '11Why Mobile-to-Mobile Wireless Malware Won't Cause a StormNathaniel Husted, Steven Myers
    LEET '11Inflight Modifications of Content: Who Are the Culprits?Chao Zhang, Cheng Huang, Keith W. Ross, David A. Maltz, Jin Li
    LEET '11Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus SoftwareMohammed I. Al-Saleh, Jedidiah R. Crandall
    LEET '11Reconstructing Hash Reversal based Proof of Work SchemesJeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin, Carl A. Gunter
    LEET '11Andbot: Towards Advanced Mobile BotnetsCui Xiang, Fang Binxing, Yin Lihua, Liu Xiaoyi, Zang Tianning
    LEET '10Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet InfrastructureChris Nunnery, Greg Sinclair, Brent ByungHoon Kang
    LEET '10Insights from the Inside: A View of Botnet Management from InfiltrationChia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song
    LEET '10The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus DistributionMoheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao
    LEET '10Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrentStevens Le Blond, Arnaud Legout, Fabrice Lefessant, Walid Dabbous, Mohamed Ali Kaafar
    LEET '10WebCop: Locating Neighborhoods of Malware on the WebJack W. Stokes, Reid Andersen, Christian Seifert, Kumar Chellapilla
    LEET '10On the Potential of Proactive Domain BlacklistingMark Felegyhazi, Christian Kreibich, Vern Paxson
    LEET '10Detection of Spam Hosts and Spam Bots Using Network Flow Traffic ModelingWilla K. Ehrlich, Anestis Karasaridis, David Hoeflin, Danielle Liu
    LEET '10Extending Black Domain Name List by Using Co-occurrence Relation between DNS QueriesKazumichi Sato, Keisuke Ishibashi, Tsuyoshi Toyono, Nobuhisa Miyake
    LEET '10Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your ComputerStephen Checkoway, Hovav Shacham, Eric Rescorla
    LEET '10DNS Prefetching and Its Privacy Implications: When Good Things Go BadFabian Monrose, Srinivas Krishnan
    LEET '10Honeybot, Your Man in the Middle for Automated Social EngineeringTobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda
    LEET '09peHash: A Novel Approach to Fast Malware ClusteringGeorg Wicherski
    LEET '09Malware Characterization through Alert Pattern DiscoverySteven Cheung, Alfonso Valdes
    LEET '09Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local ApproachesMárk Jelasity, Vilmos Bilicki
    LEET '09Spamcraft: An Inside Look At Spam Campaign OrchestrationChristian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage
    LEET '09Temporal Correlations between Spam and Phishing WebsitesTyler Moore, Richard Clayton
    LEET '09PhoneyC: A Virtual Client HoneypotJose Nazario
    LEET '09A Foray into Conficker's Logic and Rendezvous PointsPhillip Porras, Hassen Saïdi

Pages