share record
persistent URL:
Youngsang Shin , Minaxi Gupta , Steven A. Myers : The Nuts and Bolts of a Forum Spam Automator. LEET 2011 export record
dblp key:
conf/leet/Stone-GrossHSV11 share record
persistent URL:
Brett Stone-Gross , Thorsten Holz , Gianluca Stringhini , Giovanni Vigna : The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. LEET 2011 share record
persistent URL:
Qian Wang , Zesheng Chen , Chao Chen : Characterizing Internet Worm Infection Structure. LEET 2011 share record
persistent URL:
Chao Zhang , Cheng Huang , Keith W. Ross , David A. Maltz , Jin Li : Inflight Modifications of Content: Who Are the Culprits? LEET 2011 share record
persistent URL:
Christopher Kruegel : 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011. USENIX Association 2011 [contents] 2010 share record
persistent URL:
Stephen Checkoway , Hovav Shacham , Eric Rescorla : Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. LEET 2010 share record
persistent URL:
Chia Yuan Cho , Juan Caballero , Chris Grier , Vern Paxson , Dawn Song : Insights from the Inside: A View of Botnet Management from Infiltration. LEET 2010 share record
persistent URL:
Willa K. Ehrlich , Anestis Karasaridis , David A. Hoeflin , Danielle Liu : Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling. LEET 2010 share record
persistent URL:
Márk Félegyházi , Christian Kreibich , Vern Paxson : On the Potential of Proactive Domain Blacklisting. LEET 2010 share record
persistent URL:
Tobias Lauinger , Veikko Pankakoski , Davide Balzarotti , Engin Kirda : Honeybot, Your Man in the Middle for Automated Social Engineering. LEET 2010 share record
persistent URL:
Stevens Le Blond , Arnaud Legout , Fabrice Le Fessant , Walid Dabbous , Mohamed Ali Kâafar : Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. LEET 2010 share record
persistent URL:
Fabian Monrose , Srinivas Krishnan : DNS Prefetching and Its Privacy Implications: When Good Things Go Bad. LEET 2010 share record
persistent URL:
Chris Nunnery , Greg Sinclair , Brent ByungHoon Kang : Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure. LEET 2010 share record
persistent URL:
Moheeb Abu Rajab , Lucas Ballard , Panayiotis Mavrommatis , Niels Provos , Xin Zhao : The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. LEET 2010 share record
persistent URL:
Kazumichi Sato , Keisuke Ishibashi , Tsuyoshi Toyono , Nobuhisa Miyake : Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries. LEET 2010 share record
persistent URL:
Jack W. Stokes , Reid Andersen , Christian Seifert , Kumar Chellapilla : WebCop: Locating Neighborhoods of Malware on the Web. LEET 2010 share record
persistent URL:
Michael D. Bailey : 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '10, San Jose, CA, USA, April 27, 2010. USENIX Association 2010 [contents] 2009 share record
persistent URL:
Ulrich Bayer , Imam Habibi , Davide Balzarotti , Engin Kirda : A View on Current Malware Behaviors. LEET 2009 share record
persistent URL:
Steven Cheung , Alfonso Valdes : Malware Characterization through Alert Pattern Discovery. LEET 2009 share record
persistent URL:
Márk Jelasity , Vilmos Bilicki : Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches. LEET 2009 export record
dblp key:
conf/leet/KreibichKLEVPS09 share record
persistent URL:
Christian Kreibich , Chris Kanich , Kirill Levchenko , Brandon Enright , Geoffrey M. Voelker , Vern Paxson , Stefan Savage : Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 share record
persistent URL:
Tyler Moore , Richard Clayton : Temporal Correlations between Spam and Phishing Websites. LEET 2009 share record
persistent URL:
Jose Nazario : PhoneyC: A Virtual Client Honeypot. LEET 2009 export record
dblp key:
conf/leet/PolychronakisA09 share record
persistent URL:
Michalis Polychronakis , Kostas G. Anagnostakis : An Empirical Study of Real-world Polymorphic Code Injection Attacks. LEET 2009 share record
persistent URL:
Phillip A. Porras , Hassen Saïdi : A Foray into Conficker's Logic and Rendezvous Points. LEET 2009 share record
persistent URL:
Georg Wicherski : peHash: A Novel Approach to Fast Malware Clustering. LEET 2009 share record
persistent URL:
Wenke Lee : 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '09, Boston, MA, USA, April 21, 2009. USENIX Association 2009 [contents]