-
1
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
Boston, MA, Aug
-
D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In Proceedings of the 16th USENIX Security Symposium, Boston, MA, Aug. 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
4
-
-
84928140517
-
Measuring and detecting fast-flux service networks
-
San Diego, CA, Feb
-
T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling. Measuring and Detecting Fast-Flux Service Networks. In Proceedings of the 15th Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2008.
-
(2008)
Proceedings of the 15th Network and Distributed System Security Symposium (NDSS)
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
5
-
-
85076932663
-
Studying spamming botnets using botlab
-
Boston, MA, Apr
-
J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying Spamming Botnets Using Botlab. In Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, Apr. 2009.
-
(2009)
Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
6
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Alexandria, VA, Oct
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, V. Paxson, G. M. Voelker, and S. Savage. Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct. 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS)
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Paxson, V.5
Voelker, G.M.6
Savage, S.7
-
7
-
-
85084096724
-
The heisenbot uncertainty problem: Challenges in separating bots from chaff
-
San Francisco, CA, Apr
-
C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. In Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Francisco, CA, Apr. 2008.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kanich, C.1
Levchenko, K.2
Enright, B.3
Voelker, G.M.4
Savage, S.5
-
8
-
-
85076490024
-
Show me the money: Characterizing spam-advertised revenue
-
San Francisco, CA, Aug
-
C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. M. Voelker, and S. Savage. Show Me the Money: Characterizing Spam-advertised Revenue. In Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, Aug. 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Kanich, C.1
Weaver, N.2
McCoy, D.3
Halvorson, T.4
Kreibich, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.M.8
Savage, S.9
-
9
-
-
80053645529
-
Dynamics of online scam hosting infrastructure
-
Seoul, South Korea, Apr
-
M. Konte, N. Feamster, and J. Jung. Dynamics of Online Scam Hosting Infrastructure. In Proceedings of the 10th Passive and Active Measurement Conference (PAM), Seoul, South Korea, Apr. 2009.
-
(2009)
Proceedings of the 10th Passive and Active Measurement Conference (PAM)
-
-
Konte, M.1
Feamster, N.2
Jung, J.3
-
10
-
-
85084096033
-
On the spam campaign trail
-
San Francisco, CA, Apr
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. On the Spam Campaign Trail. In Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Francisco, CA, Apr. 2008.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
11
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
Boston, MA, Apr
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamcraft: An Inside Look at Spam Campaign Orchestration. In Proceedings of the 2nd USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, Apr. 2009.
-
(2009)
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
12
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, CA, May
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of the 32nd IEEE Symposium and Security and Privacy, Oakland, CA, May 2011.
-
(2011)
Proceedings of the 32nd IEEE Symposium and Security and Privacy
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Félegyházi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
McCoy, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
13
-
-
85084095292
-
Temporal correlations between spam and phishing websites
-
Boston, MA, Apr
-
T. Moore, R. Clayton, and H. Stern. Temporal Correlations between Spam and Phishing Websites. In Proceedings of the 2nd Workshop on Large-Scale Exploits and Emergent Threats (LEET), Boston, MA, Apr. 2009.
-
(2009)
Proceedings of the 2nd Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Moore, T.1
Clayton, R.2
Stern, H.3
-
14
-
-
85076285223
-
Re: CAPTChas — Understanding CAPTCHA-solving from an economic context
-
Washington, D.C., Aug
-
M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: CAPTCHAs — Understanding CAPTCHA-Solving from an Economic Context. In Proceedings of the 19th USENIX Security Symposium, Washington, D.C., Aug. 2010.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
15
-
-
84856151953
-
Dirty jobs: The role of freelance labor in web service abuse
-
San Francisco, CA, Aug
-
M. Motoyama, D. McCoy, K. Levchenko, G. M. Voelker, and S. Savage. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. In Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, Aug. 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Voelker, G.M.4
Savage, S.5
-
16
-
-
82955238527
-
Bot-Net judo: Fighting spam with itself
-
San Diego, CA, Feb
-
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. M. Voelker, V. Paxson, N. Weaver, and S. Savage. Bot-net Judo: Fighting Spam with Itself. In Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2010.
-
(2010)
Proceedings of the 17th Network and Distributed System Security Symposium (NDSS)
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelker, G.M.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
19
-
-
84968706754
-
Improving spam blacklisting through dynamic thresholding and speculative aggregation
-
San Diego, CA, Feb
-
S. Sinha, M. Bailey, and F. Jahanian. Improving Spam Blacklisting through Dynamic Thresholding and Speculative Aggregation. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2010.
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Sinha, S.1
Bailey, M.2
Jahanian, F.3
-
21
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Seattle, WA, Aug
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In Proceedings of the ACM SIGCOMM Conference, Seattle, WA, Aug. 2008.
-
(2008)
Proceedings of the ACM SIGCOMM Conference
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
|