- 2013
- Luca Allodi:
Attacker Economics for Internet-scale Vulnerability Risk Assessment. LEET 2013 - Jason W. Clark, Damon McCoy:
There Are No Free iPads: An Analysis of Survey Scams as a Business. LEET 2013 - Mohammad Karami, Damon McCoy:
Understanding the Emerging Threat of DDoS-as-a-Service. LEET 2013 - Charles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer:
FuncTracker: Discovering Shared Code to Aid Malware Forensics. LEET 2013 - Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer:
A View to a Kill: WebView Exploitation. LEET 2013 - Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon:
SinkMiner: Mining Botnet Sinkholes for Fun and Profit. LEET 2013 - Chuan Yue:
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. LEET 2013 - Chengcui Zhang, Rupak Kharel, Song Gao, Jason Britt:
Image Matching for Branding Phishing Kit Images. LEET 2013 - Vern Paxson:
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013. USENIX Association 2013 [contents] - 2012
- Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth:
Classification of UDP Traffic for DDoS Detection. LEET 2012 - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
Key Challenges in Defending Against Malicious Socialbots. LEET 2012 - Jason Britt, Brad Wardman, Alan P. Sprague, Gary Warner:
Clustering Potential Phishing Websites Using DeepMD5. LEET 2012 - Armin Büscher, Thorsten Holz:
Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. LEET 2012 - Eric Chien, Liam O'Murchu, Nicolas Falliere:
W32.Duqu: The Precursor to the Next Stuxnet. LEET 2012 - David Dittrich:
So You Want to Take Over a Botnet... LEET 2012 - Tudor Dumitras, Petros Efstathopoulos:
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis. LEET 2012 - Paul Ferguson:
Observations on Emerging Threats. LEET 2012 - Ari Juels, Ting-Fang Yen:
Sherlock Holmes and the Case of the Advanced Persistent Threat. LEET 2012 - Yeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-je Cho:
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. LEET 2012 - Mike Samuel, Úlfar Erlingsson:
Let's Parse to Prevent Pwnage. LEET 2012 - Kurt Thomas, Chris Grier, Vern Paxson:
Adapting Social Spam Infrastructure for Political Censorship. LEET 2012 - Alok Tongaonkar, Ram Keralapura, Antonio Nucci:
Challenges in Network Application Identification. LEET 2012 - Engin Kirda:
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012. USENIX Association 2012 [contents] - 2011
- Mohammed I. Al-Saleh, Jedidiah R. Crandall:
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software. LEET 2011 - Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang:
Andbot: Towards Advanced Mobile Botnets. LEET 2011 - Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter:
Reconstructing Hash Reversal based Proof of Work Schemes. LEET 2011 - Nathaniel Husted, Steven A. Myers:
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm. LEET 2011 - Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. LEET 2011 - He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker:
On the Effects of Registrar-level Intervention. LEET 2011 - Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti:
Exposing the Lack of Privacy in File Hosting Services. LEET 2011