Login / Signup
LEET
2008
2013
2008
2013
Keyphrases
Publications
2013
Chuan Yue
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security.
LEET
(2013)
Matthias Neugschwandtner
,
Martina Lindorfer
,
Christian Platzer
A View to a Kill: WebView Exploitation.
LEET
(2013)
Chengcui Zhang
,
Rupak Kharel
,
Song Gao
,
Jason Britt
Image Matching for Branding Phishing Kit Images.
LEET
(2013)
Luca Allodi
Attacker Economics for Internet-scale Vulnerability Risk Assessment.
LEET
(2013)
Mohammad Karami
,
Damon McCoy
Understanding the Emerging Threat of DDoS-as-a-Service.
LEET
(2013)
Jason W. Clark
,
Damon McCoy
There Are No Free iPads: An Analysis of Survey Scams as a Business.
LEET
(2013)
Babak Rahbarinia
,
Roberto Perdisci
,
Manos Antonakakis
,
David Dagon
SinkMiner: Mining Botnet Sinkholes for Fun and Profit.
LEET
(2013)
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013
LEET
(2013)
Charles LeDoux
,
Arun Lakhotia
,
Craig Miles
,
Vivek Notani
,
Avi Pfeffer
FuncTracker: Discovering Shared Code to Aid Malware Forensics.
LEET
(2013)
2012
Mike Samuel
,
Úlfar Erlingsson
Let's Parse to Prevent Pwnage.
LEET
(2012)
David Dittrich
So You Want to Take Over a Botnet...
LEET
(2012)
Alok Tongaonkar
,
Ram Keralapura
,
Antonio Nucci
Challenges in Network Application Identification.
LEET
(2012)
Jason Britt
,
Brad Wardman
,
Alan P. Sprague
,
Gary Warner
Clustering Potential Phishing Websites Using DeepMD5.
LEET
(2012)
Alexandru G. Bardas
,
Loai Zomlot
,
Sathya Chandran Sundaramurthy
,
Xinming Ou
,
S. Raj Rajagopalan
,
Marc R. Eisenbarth
Classification of UDP Traffic for DDoS Detection.
LEET
(2012)
Tudor Dumitras
,
Petros Efstathopoulos
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis.
LEET
(2012)
Kurt Thomas
,
Chris Grier
,
Vern Paxson
Adapting Social Spam Infrastructure for Political Censorship.
LEET
(2012)
Armin Büscher
,
Thorsten Holz
Tracking DDoS Attacks: Insights into the Business of Disrupting the Web.
LEET
(2012)
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012
LEET
(2012)
Ari Juels
,
Ting-Fang Yen
Sherlock Holmes and the Case of the Advanced Persistent Threat.
LEET
(2012)
Yazan Boshmaf
,
Ildar Muslukhov
,
Konstantin Beznosov
,
Matei Ripeanu
Key Challenges in Defending Against Malicious Socialbots.
LEET
(2012)
Paul Ferguson
Observations on Emerging Threats.
LEET
(2012)
Yeongung Park
,
Choonghyun Lee
,
Chanhee Lee
,
JiHyeog Lim
,
Sangchul Han
,
Minkyu Park
,
Seong-je Cho
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks.
LEET
(2012)
Eric Chien
,
Liam O'Murchu
,
Nicolas Falliere
W32.Duqu: The Precursor to the Next Stuxnet.
LEET
(2012)
2011
Stevens Le Blond
,
Pere Manils
,
Chaabane Abdelberi
,
Mohamed Ali Kâafar
,
Claude Castelluccia
,
Arnaud Legout
,
Walid Dabbous
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
LEET
(2011)
Brett Stone-Gross
,
Thorsten Holz
,
Gianluca Stringhini
,
Giovanni Vigna
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
LEET
(2011)
Qian Wang
,
Zesheng Chen
,
Chao Chen
Characterizing Internet Worm Infection Structure.
LEET
(2011)
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011
LEET
(2011)
Nick Nikiforakis
,
Marco Balduzzi
,
Steven Van Acker
,
Wouter Joosen
,
Davide Balzarotti
Exposing the Lack of Privacy in File Hosting Services.
LEET
(2011)
Mohammed I. Al-Saleh
,
Jedidiah R. Crandall
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software.
LEET
(2011)
He Liu
,
Kirill Levchenko
,
Márk Félegyházi
,
Christian Kreibich
,
Gregor Maier
,
Geoffrey M. Voelker
On the Effects of Registrar-level Intervention.
LEET
(2011)
Chao Zhang
,
Cheng Huang
,
Keith W. Ross
,
David A. Maltz
,
Jin Li
Inflight Modifications of Content: Who Are the Culprits?
LEET
(2011)
Nathaniel Husted
,
Steven A. Myers
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm.
LEET
(2011)
Jeff Green
,
Joshua Juen
,
Omid Fatemieh
,
Ravinder Shankesi
,
Dong (Kevin) Jin
,
Carl A. Gunter
Reconstructing Hash Reversal based Proof of Work Schemes.
LEET
(2011)
Youngsang Shin
,
Minaxi Gupta
,
Steven A. Myers
The Nuts and Bolts of a Forum Spam Automator.
LEET
(2011)
Xiang Cui
,
Binxing Fang
,
Lihua Yin
,
Xiaoyi Liu
,
Tianning Zang
Andbot: Towards Advanced Mobile Botnets.
LEET
(2011)
2010
Stevens Le Blond
,
Arnaud Legout
,
Fabrice Le Fessant
,
Walid Dabbous
,
Mohamed Ali Kâafar
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent.
LEET
(2010)
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '10, San Jose, CA, USA, April 27, 2010
LEET
(2010)
Tobias Lauinger
,
Veikko Pankakoski
,
Davide Balzarotti
,
Engin Kirda
Honeybot, Your Man in the Middle for Automated Social Engineering.
LEET
(2010)
Chris Nunnery
,
Greg Sinclair
,
Brent ByungHoon Kang
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure.
LEET
(2010)
Kazumichi Sato
,
Keisuke Ishibashi
,
Tsuyoshi Toyono
,
Nobuhisa Miyake
Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries.
LEET
(2010)
Jack W. Stokes
,
Reid Andersen
,
Christian Seifert
,
Kumar Chellapilla
WebCop: Locating Neighborhoods of Malware on the Web.
LEET
(2010)
Chia Yuan Cho
,
Juan Caballero
,
Chris Grier
,
Vern Paxson
,
Dawn Song
Insights from the Inside: A View of Botnet Management from Infiltration.
LEET
(2010)
Márk Félegyházi
,
Christian Kreibich
,
Vern Paxson
On the Potential of Proactive Domain Blacklisting.
LEET
(2010)
Stephen Checkoway
,
Hovav Shacham
,
Eric Rescorla
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer.
LEET
(2010)
Fabian Monrose
,
Srinivas Krishnan
DNS Prefetching and Its Privacy Implications: When Good Things Go Bad.
LEET
(2010)
Moheeb Abu Rajab
,
Lucas Ballard
,
Panayiotis Mavrommatis
,
Niels Provos
,
Xin Zhao
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution.
LEET
(2010)
Willa K. Ehrlich
,
Anestis Karasaridis
,
David A. Hoeflin
,
Danielle Liu
Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling.
LEET
(2010)