LEET '11 | On the Effects of Registrar-level Intervention | He (Lonnie) Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker |
LEET '11 | Characterizing Internet Worm Infection Structure | Qian Wang, Zesheng Chen, Chao Chen |
LEET '11 | Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm | Nathaniel Husted, Steven Myers |
LEET '11 | Inflight Modifications of Content: Who Are the Culprits? | Chao Zhang, Cheng Huang, Keith W. Ross, David A. Maltz, Jin Li |
LEET '11 | Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software | Mohammed I. Al-Saleh, Jedidiah R. Crandall |
LEET '11 | Reconstructing Hash Reversal based Proof of Work Schemes | Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin, Carl A. Gunter |
LEET '11 | Andbot: Towards Advanced Mobile Botnets | Cui Xiang, Fang Binxing, Yin Lihua, Liu Xiaoyi, Zang Tianning |
LEET '10 | Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure | Chris Nunnery, Greg Sinclair, Brent ByungHoon Kang |
LEET '10 | Insights from the Inside: A View of Botnet Management from Infiltration | Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song |
LEET '10 | The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution | Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao |
LEET '10 | Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent | Stevens Le Blond, Arnaud Legout, Fabrice Lefessant, Walid Dabbous, Mohamed Ali Kaafar |
LEET '10 | WebCop: Locating Neighborhoods of Malware on the Web | Jack W. Stokes, Reid Andersen, Christian Seifert, Kumar Chellapilla |
LEET '10 | On the Potential of Proactive Domain Blacklisting | Mark Felegyhazi, Christian Kreibich, Vern Paxson |
LEET '10 | Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling | Willa K. Ehrlich, Anestis Karasaridis, David Hoeflin, Danielle Liu |
LEET '10 | Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries | Kazumichi Sato, Keisuke Ishibashi, Tsuyoshi Toyono, Nobuhisa Miyake |
LEET '10 | Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer | Stephen Checkoway, Hovav Shacham, Eric Rescorla |
LEET '10 | DNS Prefetching and Its Privacy Implications: When Good Things Go Bad | Fabian Monrose, Srinivas Krishnan |
LEET '10 | Honeybot, Your Man in the Middle for Automated Social Engineering | Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda |
LEET '09 | peHash: A Novel Approach to Fast Malware Clustering | Georg Wicherski |
LEET '09 | Malware Characterization through Alert Pattern Discovery | Steven Cheung, Alfonso Valdes |
LEET '09 | Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches | Márk Jelasity, Vilmos Bilicki |
LEET '09 | Spamcraft: An Inside Look At Spam Campaign Orchestration | Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
LEET '09 | Temporal Correlations between Spam and Phishing Websites | Tyler Moore, Richard Clayton |
LEET '09 | PhoneyC: A Virtual Client Honeypot | Jose Nazario |
LEET '09 | A Foray into Conficker's Logic and Rendezvous Points | Phillip Porras, Hassen Saïdi |