Papers

Search results

    ConferenceTitleAuthor(s)
    LEET '09A View on Current Malware BehaviorsUlrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda
    LEET '09An Empirical Study of Real-world Polymorphic Code Injection AttacksMichalis Polychronakis, Kostas G. Anagnostakis
    LEET '08On the Spam Campaign TrailChristian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage
    LEET '08Characterizing Botnets from Email Spam RecordsLi Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J.D. Tygar
    LEET '08Peeking into Spammer Behavior from a Unique Vantage PointAbhinav Pathak, Y. Charlie Hu, Z. Morley Mao
    LEET '08Behind Phishing: An Examination of Phisher Modi OperandiD. Kevin McGrath, Minaxi Gupta
    LEET '08Designing and Implementing Malicious HardwareSamuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
    LEET '08Catching Instant Messaging Worms with Change-Point Detection TechniquesGuanhua Yan, Zhen Xiao, Stephan Eidenbenz
    LEET '08Exploiting Machine Learning to Subvert Your Spam FilterBlaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia
    LEET '08Conducting Cybersecurity Research Legally and EthicallyAaron J. Burstein
    LEET '08Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormThorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling
    LEET '08The Heisenbot Uncertainty Problem: Challenges in Separating Bots from ChaffChris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage
    LEET '08Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareMichalis Polychronakis, Panayiotis Mavrommatis

Pages