-
1
-
-
85084096603
-
A view on current malware behaviors
-
U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, and C. Kruegel. A View on Current Malware Behaviors. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009.
-
(2009)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Bayer, U.1
Habibi, I.2
Balzarotti, D.3
Kirda, E.4
Kruegel, C.5
-
3
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
C. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song. Insights from the Inside: A View of Botnet Management from Infiltration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010.
-
(2010)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Cho, C.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
4
-
-
77955198762
-
-
A. Decker, D. Sancho, L. Kharouni, M. Goncharov, and R. McArdle. A Study of the Pushdo / Cutwail Botnet. http://us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/ study_of_pushdo.pdf, 2009.
-
(2009)
A Study of the Pushdo / Cutwail Botnet
-
-
Decker, A.1
Sancho, D.2
Kharouni, L.3
Goncharov, M.4
McArdle, R.5
-
8
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In ACM Conference on Computer and Communications Security (CCS), 2008.
-
(2008)
ACM Conference on Computer and Communications Security (CCS)
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
11
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamcraft: An Inside Look at Spam Campaign Orchestration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009.
-
(2009)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
13
-
-
85076285223
-
Re:CApTchas – understanding CAPTCHA-solving services in an economic context
-
M. Motoyama, K. Levchenko, C. Kanich, D. Mccoy, G. M. Voelker, and S. Savage. Re:CAPTCHAs – Understanding CAPTCHA-Solving Services in an Economic Context. In USENIX Security Symposium, 2010.
-
(2010)
USENIX Security Symposium
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
16
-
-
82955238527
-
Botnet judo: Fighting spam with itself
-
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. Voelker, V. Paxson, N. Weaver, and S. Savage. Botnet Judo: Fighting Spam with Itself. In Symposium on Network and Distributed System Security (NDSS), 2010.
-
(2010)
Symposium on Network and Distributed System Security (NDSS)
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelker, G.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
18
-
-
77954925610
-
Walowdac analysis of a peer-to-peer botnet
-
B. Stock, J. Gobel, M. Engelberth, F. Freiling, and T. Holz. Walowdac Analysis of a Peer-to-Peer Botnet. In European Conference on Computer Network Defense, 2009.
-
(2009)
European Conference on Computer Network Defense
-
-
Stock, B.1
Gobel, J.2
Engelberth, M.3
Freiling, F.4
Holz, T.5
-
19
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, R. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, R.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
20
-
-
77950794331
-
Fire: Finding rogue networks
-
B. Stone-Gross, A. Moser, C. Kruegel, E. Kirda, and K. Almeroth. FIRE: FInding Rogue nEtworks. In Annual Computer Security Applications Conference (ACSAC), 2009.
-
(2009)
Annual Computer Security Applications Conference (ACSAC)
-
-
Stone-Gross, B.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
Almeroth, K.5
-
22
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
August
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. SIGCOMM Comput. Commun. Rev., 38, August 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
23
-
-
85084095135
-
Characterizing botnets from email spam records
-
L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, and J. D. Tygar. Characterizing Botnets From Email Spam Records. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.R.3
Wang, H.J.4
Tygar, J.D.5
|