Botnet Analysis and mitigation
Developing novel botnet mitigation techniques
Publications
2014 (1 publication)
Extracting Probable Command and Control Signatures for Detecting Botnets Proceedings of the ACM Symposium on Applied Computing (SAC 2014) BibTeX PDF (154.6 KB)
2013 (1 publication)
2012 (5 publications)
You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions Proceedings of the ACM Conference on Computer and Communications Security (CCS 2012) BibTeX PDF (737.7 KB)
Blacksheep: Detecting Compromised Hosts in Homogeneous Crowds Proceedings of the ACM Conference on Computer and Communications Security (CCS 2012) BibTeX PDF (424.7 KB)
Poultry Markets: On the Underground Economy of Twitter Followers Proceedings of the Workshop on Online Social Networks (WOSN 2012) BibTeX PDF (767.5 KB)
B@BEL: Leveraging Email Delivery for Spam Mitigation Proceedings of the USENIX Security Symposium (USENIX Security 2012) BibTeX PDF (983.3 KB)
EVILSEED: A Guided Approach to Finding Malicious Web Pages Proceedings of the IEEE Symposium on Security and Privacy (SSP 2012) BibTeX PDF (759.4 KB)
2011 (11 publications)
BareBox: Efficient Malware Analysis on Bare Metal Proceedings of the Annual Computer Security Applications Conference (ACSAC 2011) BibTeX PDF (726.0 KB)
Understanding Fraudulent Activities in Online Ad Exchanges Proceedings of the Internet Measurement Conference (IMC 2011) BibTeX PDF (781.4 KB)
Fear the EAR: Discovering and Mitigating Execution After Redirect Vulnerabilities Proceedings of the ACM Conference on Computer and Communications Security (CCS 2011) BibTeX PDF (228.2 KB)
Shellzer: a tool for the dynamic analysis of malicious shellcode Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2011) BibTeX PDF (284.4 KB)
BotMagnifier: Locating Spambots on the Internet Proceedings of the USENIX Security Symposium (USENIX Security 2011) BibTeX PDF (286.6 KB)
Jackstraws: Picking Command and Control Connections from Bot Traffic Proceedings of the USENIX Security Symposium (USENIX Security 2011) PDF (313.7 KB)
Escape from Monkey Island: Evading High-Interaction Honeyclients Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011) BibTeX PDF (224.9 KB)
The Underground Economy of Fake Antivirus Software Proceedings of the Workshop on Economics of Information Security (WEIS 2011) BibTeX PDF (799.3 KB)
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns Proceedings of the Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET 2011) BibTeX PDF (1.2 MB)
PiOS: Detecting Privacy Leaks in iOS Applications Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 2011) BibTeX PDF (272.1 KB)
Exposure: Finding Malicious Domains Using Passive DNS Analysis Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 2011) PDF (275.6 KB)
2010 (7 publications)
AccessMiner: Using System-Centric Models for Malware Protection Proceedings of the ACM Conference on Computer and Communications Security (CCS 2010) BibTeX PDF (452.1 KB)
Why Johnny Can't Pentest: An Analysis of Black-box Web Vulnerability Scanners Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2010) BibTeX PDF (177.3 KB)
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries Proceedings of the IEEE Symposium on Security and Privacy (SSP 2010) BibTeX PDF (474.7 KB)
Identifying Dormant Functionality in Malware Programs Proceedings of the IEEE Symposium on Security and Privacy (SSP 2010) BibTeX PDF (367.5 KB)
Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code Proceedings of the International World Wide Web Conference (WWW 2010) BibTeX PDF (242.5 KB)
Are BGP Routers Open To Attack? An Experiment Proceedings of the Open Research Problems in Network Security (iNetSec 2010) BibTeX PDF (240.4 KB)
Portions of this work are supported by the ONR under Grant N00014-09-1-1042Research topics
People involved
Faculty
Post-doctoral Researchers
PhD Students
- Last update
- April 10, 2014, 7:05 p.m.