Theme Selector
Filter by
No Results Found, Please Adjust Your Search
network security
Taking down Gooligan part 3 — monetization and clean-up
Mar 2018
network security
Taking down Gooligan: part 2 — inner workings
Mar 2018
network security
Taking down Gooligan: part 1 — overview
Mar 2018
network security
Hunting down Gooligan — retrospective analysis
Botconf 2017
cybersecurity
Inside Mirai the infamous IoT Botnet: A Retrospective Analysis
Dec 2017
network security
Understanding the Mirai Botnet
Usenix Security 2017
web security
The Security Impact of HTTPS Interception
NDSS 2017
anti-abuse
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
RAID 2016
anti-abuse
In-depth analysis of the lessons we learned while protecting gmail users
Apr 2016
network security
How email in transit can be intercepted using dns hijacking
Jan 2016
network security
Understanding how tls downgrade attacks prevent email encryption
Dec 2015
network security
Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security
IMC 2015
web security
Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities
Mar 2013
hacking
Beyond files recovery owade cloud-based forensic
Black hat 2011
web security
The emergence of cross channel scripting
CACM 2010
network security
Using strategy objectives for network security analysis
Inscrypt 2009
network security
Extending anticipation games with location penalty and timeline
FAST 2008
network security
Netqi a model checker for anticipation game
ATVA 2008
network security
Probabilistic protocol identification for hard to classify protocol
WISTP 2008
network security
A logical framework for evaluating network resilience against faults and attacks
ASIAN 2007
network security
Time has something to tell us about network address translation
NordSec 2007