Index of /~bryan/papers2/security/covert.io

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]Machine learning in adversarial environments.pdf2014-07-20 14:43 47K 
[   ]Sherlock Holmes and The Case of the Advanced Persistent Threat.pdf2014-07-20 14:43 88K 
[   ]MISHIMA - Multilateration of Internet hosts hidden using malicious fast-ï¬%82ux agents.pdf2014-07-20 14:43 124K 
[   ]The Classification of Valuable Data in an Assumption of Breach Paradigm.pdf2014-07-20 14:43 133K 
[   ]Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation.pdf2014-07-20 14:43 140K 
[   ]FuncTracker - Discovering Shared Code to Aid Malware Forensics Extended Abstract.pdf2014-07-20 14:43 148K 
[   ]Traffic aggregation for malware detection.pdf2014-07-20 14:43 149K 
[   ]Outside the Closed World - On Using Machine Learning For Network Intrusion Detection.pdf2014-07-20 14:43 158K 
[   ]Back to Basics - Beyond Network Hygiene.pdf2014-07-20 14:43 168K 
[   ]Mobile Malware Detection Based on Energy Fingerprints â%80%94 A Dead End.pdf2014-07-20 14:43 169K 
[   ]FiG - Automatic Fingerprint Generation.pdf2014-07-20 14:43 175K 
[   ]Revealing Botnet Membership Using DNSBL Counter-Intelligence.pdf2014-07-20 14:43 180K 
[   ]BitShred - Fast, Scalable Code Reuse Detection in Binary Code.pdf2014-07-20 14:43 182K 
[   ]FLIPS - Hybrid Adaptive Intrusion Prevention.pdf2014-07-20 14:43 189K 
[   ]Detecting unknown network attacks using language models.pdf2014-07-20 14:43 190K 
[   ]N-Gram against the Machine - On the Feasibility of the N-Gram Network Analysis for Binary Protocols.pdf2014-07-20 14:43 192K 
[   ]Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework.pdf2014-07-20 14:43 194K 
[   ]Anomaly-based intrusion detection in software as a service.pdf2014-07-20 14:43 204K 
[   ]Spectrogram - A mixture-of-markov-chains model for anomaly detection in web traffic.pdf2014-07-20 14:43 212K 
[   ]Escape from Monkey Island - Evading High-Interaction Honeyclients.pdf2014-07-20 14:43 225K 
[   ]Privacy-preserving payload-based correlation for accurate malicious traffic detection.pdf2014-07-20 14:43 230K 
[   ]SinkMiner- Mining Botnet Sinkholes for Fun and Profit.pdf2014-07-20 14:43 247K 
[   ]Comparing anomaly detection techniques for HTTP.pdf2014-07-20 14:43 267K 
[   ]CloudFence - Data Flow Tracking as a Cloud Service.pdf2014-07-20 14:43 273K 
[   ]PAYL2 - Anomalous Payload-based Worm Detection and Signature Generation.pdf2014-07-20 14:43 279K 
[   ]PAYL - Anomalous Payload-based Network Intrusion Detection.pdf2014-07-20 14:43 285K 
[   ]Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling.pdf2014-07-20 14:43 285K 
[   ]Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning.pdf2014-07-20 14:43 297K 
[   ]Exposure - Finding malicious domains using passive dns analysis.pdf2014-07-20 14:43 298K 
[   ]Filtering Spam with Behavioral Blacklisting.pdf2014-07-20 14:43 299K 
[   ]Understanding the Network-Level Behavior of Spammers.pdf2014-07-20 14:43 301K 
[   ]A Preliminary Analysis of Vulnerability Scores for Attacks in Wild.pdf2014-07-20 14:43 302K 
[   ]Netgator - Malware Detection Using Program Interactive Challenges - slides.pdf2014-07-20 14:43 306K 
[   ]CAMP - Content Agnostic Malware Protection.pdf2014-07-20 14:43 308K 
[   ]Anagram - A Content Anomaly Detector Resistant to Mimicry Attack.pdf2014-07-20 14:43 326K 
[   ]Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks.pdf2014-07-20 14:43 327K 
[   ]On the Mismanagement and Maliciousness of Networks.pdf2014-07-20 14:43 332K 
[   ]Crawling BitTorrent DHTs for Fun and Proï¬%81t.pdf2014-07-20 14:43 337K 
[   ]A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.pdf2014-07-20 14:43 338K 
[   ]Tor vs NSA.pdf2014-07-20 14:43 339K 
[   ]Attacker Economics for Internet-scale Vulnerability Risk Assessment.pdf2014-07-20 14:43 347K 
[   ]Casting out demons - Sanitizing training data for anomaly sensors.pdf2014-07-20 14:43 376K 
[   ]Cujo - Efficient detection and prevention of drive-by-download attacks.pdf2014-07-20 14:43 381K 
[   ]ReDeBug - finding unpatched code clones in entire os distributions.pdf2014-07-20 14:43 388K 
[   ]Anonymous Hacking Group -- OpNewblood-Super-Secret-Security-Handbook.pdf2014-07-20 14:43 389K 
[   ]Indexing Million of Packets per Second using GPUs.pdf2014-07-20 14:43 395K 
[   ]Automatic Analysis of Malware Behavior using Machine Learning.pdf2014-07-20 14:43 398K 
[   ]On the infeasibility of modeling polymorphic shellcode.pdf2014-07-20 14:43 399K 
[   ]Shingled Graph Disassembly - Finding the Undecideable Path.pdf2014-07-20 14:43 402K 
[   ]Using File Relationships in Malware Classification.pdf2014-07-20 14:43 408K 
[   ]ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection.pdf2014-07-20 14:43 414K 
[   ]Deobfuscating Embedded Malware using Probable-Plaintext Attacks.pdf2014-07-20 14:43 415K 
[   ]Understanding the Domain Registration Behavior of Spammers.pdf2014-07-20 14:43 448K 
[   ]A survey on automated dynamic malware-analysis techniques and tools.pdf2014-07-20 14:43 451K 
[   ]A study of malcode-bearing documents.pdf2014-07-20 14:43 454K 
[   ]Ampliï¬%81cation Hell - Revisiting Network Protocols for DDoS Abuse.pdf2014-07-20 14:43 465K 
[   ]Effective Anomaly Detection with Scarce Training Data.pdf2014-07-20 14:43 490K 
[   ]Timing of Cyber Conflict.pdf2014-07-20 14:43 490K 
[   ]Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine.pdf2014-07-20 14:43 500K 
[   ]EFFORT - Efficient and Effective Bot Malware Detection.pdf2014-07-20 14:43 538K 
[   ]Local System Security via SSHD Instrumentation .pdf2014-07-20 14:43 540K 
[   ]The Tangled Web of Password Reuse.pdf2014-07-20 14:43 541K 
[   ]Protecting a moving target - Addressing web application concept drift.pdf2014-07-20 14:43 557K 
[   ]ZMap - Fast Internet-Wide Scanning and its Security Applications.pdf2014-07-20 14:43 558K 
[   ]Behavioral clustering of http-based malware and signature generation using malicious network traces.pdf2014-07-20 14:43 562K 
[   ]Beheading Hydras - Performing Effective Botnet Takedowns.pdf2014-07-20 14:43 563K 
[   ]A static, packer-agnostic filter to detect similar malware samples.pdf2014-07-20 14:43 600K 
[   ]ZMap - Fast Internet-Wide Scanning and its Security Applications (slides).pdf2014-07-20 14:43 607K 
[   ]CyberProbe - Towards Internet-Scale Active Detection of Malicious Servers.pdf2014-07-20 14:43 636K 
[   ]FIRMA - Malware Clustering and Network Signature Generation with Mixed Network Behaviors.pdf2014-07-20 14:43 646K 
[   ]Measuring and Detecting Malware Downloads in Live Network Traffic.pdf2014-07-20 14:43 663K 
[   ]Risks and Realization of HTTPS Traffic Analysis.pdf2014-07-20 14:43 673K 
[   ]Monitoring the Initial DNS Behavior of Malicious Domains.pdf2014-07-20 14:43 678K 
[   ]From throw-away traffic to bots - detecting the rise of dga-based malware.pdf2014-07-20 14:43 697K 
[   ]The security of machine learning.pdf2014-07-20 14:43 701K 
[   ]Spamming botnets - signatures and characteristics.pdf2014-07-20 14:43 707K 
[   ]VAMO - Towards a Fully Automated Malware Clustering Validity Analysis.pdf2014-07-20 14:43 788K 
[   ]Scalable fine-grained behavioral clustering of http-based malware.pdf2014-07-20 14:43 798K 
[   ]Investigating Advanced Persistent Threat 1 (APT1).pdf2014-07-20 14:43 809K 
[   ]Demystifying service discovery - Implementing an internet-wide scanner.pdf2014-07-20 14:43 814K 
[   ]Toward Stealthy Malware Detection.pdf2014-07-20 14:43 861K 
[   ]Detecting Traffic Snooping in Tor Using Decoys.pdf2014-07-20 14:43 866K 
[   ]McPAD - A multiple classifier system for accurate payload-based anomaly detection.pdf2014-07-20 14:43 883K 
[   ]Malware files clustering based on file geometry and visualization using R language.pdf2014-07-20 14:43 913K 
[   ]Decoy Document Deployment for Effective Masquerade Attack Detection.pdf2014-07-20 14:43 922K 
[   ]SigMal - A Static Signal Processing Based Malware Triage.pdf2014-07-20 14:43 930K 
[   ]A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence.pdf2014-07-20 14:43 937K 
[   ]Image Matching for Branding Phishing Kit Images.pdf2014-07-20 14:43 952K 
[   ]Eureka - A framework for enabling static malware analysis.pdf2014-07-20 14:43 961K 
[   ]A Kill Chain Analysis of the 2013 Target Data Breach.pdf2014-07-20 14:43 1.0M 
[   ]Toward Black-Box Detection of Logic Flaws in Web Applications.pdf2014-07-20 14:43 1.0M 
[   ]Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf2014-07-20 14:43 1.0M 
[   ]Multi-Label Learning with Millions of Labels - Recommending Advertiser Bid Phrases for Web Pages.pdf2014-07-20 14:43 1.0M 
[   ]Selling Off Privacy at Auction.pdf2014-07-20 14:43 1.0M 
[   ]Leveraging Honest Users - Stealth Command-and-Control of Botnets.pdf2014-07-20 14:43 1.0M 
[   ]The Sniper Attack - Anonymously Deanonymizing and Disabling the Tor Network.pdf2014-07-20 14:43 1.1M 
[   ]FuncTracker - Discovering Shared Code (to aid malware forensics) - slides.pdf2014-07-20 14:43 1.1M 
[   ]Gyrus - A Framework for User-Intent Monitoring of Text-Based Networked Applications.pdf2014-07-20 14:43 1.1M 
[   ]Kopis - Detecting malware domains at the upper dns hierarchy.pdf2014-07-20 14:43 1.1M 
[   ]Image Matching for Branding Phishing Kit Images - slides.pdf2014-07-20 14:43 1.2M 
[   ]On the Feasibility of Online Malware Detection with Performance Counters.pdf2014-07-20 14:43 1.2M 
[   ]Measuring pay-per-install - the commoditization of malware distribution.pdf2014-07-20 14:43 1.3M 
[   ]Notos - Building a dynamic reputation system for dns.pdf2014-07-20 14:43 1.3M 
[   ]Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis.pdf2014-07-20 14:43 1.4M 
[   ]Polonium - Tera-Scale Graph Mining for Malware Detection.pdf2014-07-20 14:43 1.4M 
[   ]Fast Automated Unpacking and Classification of Malware.pdf2014-07-20 14:43 1.4M 
[   ]Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides.pdf2014-07-20 14:43 1.4M 
[   ]Detecting Logic Vulnerabilities in E-Commerce Applications.pdf2014-07-20 14:43 1.5M 
[   ]Tracking Memory Writes for Malware Classification and Code Reuse Identification.pdf2014-07-20 14:43 1.5M 
[   ]APT1 Technical backstage (malware.lu hack backs of APT1 servers).pdf2014-07-20 14:43 1.7M 
[   ]Extraction of Statistically Significant Malware Behaviors.pdf2014-07-20 14:43 1.8M 
[   ]Practical Comprehensive Bounds on Surreptitious Communication Over DNS - slides.pdf2014-07-20 14:43 1.8M 
[   ]Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis).pdf2014-07-20 14:43 1.9M 
[   ]Putting out a HIT - Crowdsourcing Malware Installs.pdf2014-07-20 14:43 1.9M 
[   ]HMMPayl - An intrusion detection system based on Hidden Markov Models.pdf2014-07-20 14:43 1.9M 
[   ]Large-Scale Malware Analysis, Detection, and Signature Generation.pdf2014-07-20 14:43 2.0M 
[   ]Trafï¬%81cking Fraudulent Accounts - The Role of the Underground Market in Twitter Spam and Abuse.pdf2014-07-20 14:43 2.1M 
[   ]ExecScent- Mining for New C and C Domains in Live Networks with Adapive Control Protocol Templates - slides.pdf2014-07-20 14:43 2.1M 
[   ]The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions.pdf2014-07-20 14:43 2.2M 
[   ]Revolver - An Automated Approach to the Detection of Evasive Web-based Malware.pdf2014-07-20 14:43 2.2M 
[   ]Scambaiter - Understanding Targeted Nigerian Scams on Craigslist.pdf2014-07-20 14:43 2.3M 
[   ]Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning - slides.pdf2014-07-20 14:43 2.4M 
[   ]An Exploration of Geolocation and Traffic Visualisation Using Network Flows to Aid in Cyber Defence.pdf2014-07-20 14:43 2.7M 
[   ]gitDigger - Creating useful wordlists from GitHub.pdf2014-07-20 14:43 2.8M 
[   ]The Role of the Underground Market in Twitter Spam and Abuse.pdf2014-07-20 14:43 2.8M 
[   ]BitShred - Fast, Scalable Malware Triage.pdf2014-07-20 14:43 2.8M 
[   ]DSpin - Detecting Automatically Spun Content on the Web.pdf2014-07-20 14:43 2.8M 
[   ]Self-organized Collaboration of Distributed IDS Sensors.pdf2014-07-20 14:43 3.1M 
[   ]ExecScent- Mining for New C and C Domains in Live Networks with Adapive Control Protocol Templates.pdf2014-07-20 14:43 3.2M 
[   ]A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classiï¬%81cation.pdf2014-07-20 14:43 3.2M 
[   ]The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions - slides.pdf2014-07-20 14:43 3.5M 
[   ]Connected Colors - Unveiling the Structure of Criminal Networks.pdf2014-07-20 14:43 3.6M 
[   ]PoisonAmplifier - A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.pdf2014-07-20 14:43 4.1M 
[   ]HITB2013AMS - Defending The Enterprise, the Russian Way.pdf2014-07-20 14:43 4.6M 
[   ]Synoptic Graphlet - Bridging the Gap between Supervised and Unsupervised Profiling of Host-level Network Traffic.pdf2014-07-20 14:43 4.7M 
[   ]Practical Comprehensive Bounds on Surreptitious Communication Over DNS.pdf2014-07-20 14:43 4.7M 
[   ]Efficient Multidimensional Aggregation for Large Scale Monitoring.pdf2014-07-20 14:43 5.5M 
[   ]VAST- Network Visibility Across Space and Time.pdf2014-07-20 14:43 5.8M 
[   ]Nazca - Detecting Malware Distribution in Large-Scale Networks.pdf2014-07-20 14:43 6.2M 
[   ]Network Traffic Characterization Using (p, n)-grams Packet Representation.pdf2014-07-20 14:43 7.5M 
[   ]Mining Botnet Sink holes - slides.pdf2014-07-20 14:43 8.1M 
[   ]Malware vs Big Data (Ubrella Labs).pdf2014-07-20 14:43 10M 

Apache/2.4.25 (Debian) Server at diyhpl.us Port 80