Index of /~bryan/papers2/security/covert.io
Name
Last modified
Size
Description
Parent Directory
-
Malware vs Big Data (Ubrella Labs).pdf
2014-07-20 14:43
10M
Mining Botnet Sink holes - slides.pdf
2014-07-20 14:43
8.1M
Network Traffic Characterization Using (p, n)-grams Packet Representation.pdf
2014-07-20 14:43
7.5M
Nazca - Detecting Malware Distribution in Large-Scale Networks.pdf
2014-07-20 14:43
6.2M
VAST- Network Visibility Across Space and Time.pdf
2014-07-20 14:43
5.8M
Efficient Multidimensional Aggregation for Large Scale Monitoring.pdf
2014-07-20 14:43
5.5M
Practical Comprehensive Bounds on Surreptitious Communication Over DNS.pdf
2014-07-20 14:43
4.7M
Synoptic Graphlet - Bridging the Gap between Supervised and Unsupervised Profiling of Host-level Network Traffic.pdf
2014-07-20 14:43
4.7M
HITB2013AMS - Defending The Enterprise, the Russian Way.pdf
2014-07-20 14:43
4.6M
PoisonAmplifier - A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.pdf
2014-07-20 14:43
4.1M
Connected Colors - Unveiling the Structure of Criminal Networks.pdf
2014-07-20 14:43
3.6M
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions - slides.pdf
2014-07-20 14:43
3.5M
A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classiï¬%81cation.pdf
2014-07-20 14:43
3.2M
ExecScent- Mining for New C and C Domains in Live Networks with Adapive Control Protocol Templates.pdf
2014-07-20 14:43
3.2M
Self-organized Collaboration of Distributed IDS Sensors.pdf
2014-07-20 14:43
3.1M
DSpin - Detecting Automatically Spun Content on the Web.pdf
2014-07-20 14:43
2.8M
BitShred - Fast, Scalable Malware Triage.pdf
2014-07-20 14:43
2.8M
The Role of the Underground Market in Twitter Spam and Abuse.pdf
2014-07-20 14:43
2.8M
gitDigger - Creating useful wordlists from GitHub.pdf
2014-07-20 14:43
2.8M
An Exploration of Geolocation and Traffic Visualisation Using Network Flows to Aid in Cyber Defence.pdf
2014-07-20 14:43
2.7M
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning - slides.pdf
2014-07-20 14:43
2.4M
Scambaiter - Understanding Targeted Nigerian Scams on Craigslist.pdf
2014-07-20 14:43
2.3M
Revolver - An Automated Approach to the Detection of Evasive Web-based Malware.pdf
2014-07-20 14:43
2.2M
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions.pdf
2014-07-20 14:43
2.2M
ExecScent- Mining for New C and C Domains in Live Networks with Adapive Control Protocol Templates - slides.pdf
2014-07-20 14:43
2.1M
Trafï¬%81cking Fraudulent Accounts - The Role of the Underground Market in Twitter Spam and Abuse.pdf
2014-07-20 14:43
2.1M
Large-Scale Malware Analysis, Detection, and Signature Generation.pdf
2014-07-20 14:43
2.0M
HMMPayl - An intrusion detection system based on Hidden Markov Models.pdf
2014-07-20 14:43
1.9M
Putting out a HIT - Crowdsourcing Malware Installs.pdf
2014-07-20 14:43
1.9M
Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis).pdf
2014-07-20 14:43
1.9M
Practical Comprehensive Bounds on Surreptitious Communication Over DNS - slides.pdf
2014-07-20 14:43
1.8M
Extraction of Statistically Significant Malware Behaviors.pdf
2014-07-20 14:43
1.8M
APT1 Technical backstage (malware.lu hack backs of APT1 servers).pdf
2014-07-20 14:43
1.7M
Tracking Memory Writes for Malware Classification and Code Reuse Identification.pdf
2014-07-20 14:43
1.5M
Detecting Logic Vulnerabilities in E-Commerce Applications.pdf
2014-07-20 14:43
1.5M
Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides.pdf
2014-07-20 14:43
1.4M
Fast Automated Unpacking and Classification of Malware.pdf
2014-07-20 14:43
1.4M
Polonium - Tera-Scale Graph Mining for Malware Detection.pdf
2014-07-20 14:43
1.4M
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis.pdf
2014-07-20 14:43
1.4M
Notos - Building a dynamic reputation system for dns.pdf
2014-07-20 14:43
1.3M
Measuring pay-per-install - the commoditization of malware distribution.pdf
2014-07-20 14:43
1.3M
On the Feasibility of Online Malware Detection with Performance Counters.pdf
2014-07-20 14:43
1.2M
Image Matching for Branding Phishing Kit Images - slides.pdf
2014-07-20 14:43
1.2M
Kopis - Detecting malware domains at the upper dns hierarchy.pdf
2014-07-20 14:43
1.1M
Gyrus - A Framework for User-Intent Monitoring of Text-Based Networked Applications.pdf
2014-07-20 14:43
1.1M
FuncTracker - Discovering Shared Code (to aid malware forensics) - slides.pdf
2014-07-20 14:43
1.1M
The Sniper Attack - Anonymously Deanonymizing and Disabling the Tor Network.pdf
2014-07-20 14:43
1.1M
Leveraging Honest Users - Stealth Command-and-Control of Botnets.pdf
2014-07-20 14:43
1.0M
Selling Off Privacy at Auction.pdf
2014-07-20 14:43
1.0M
Multi-Label Learning with Millions of Labels - Recommending Advertiser Bid Phrases for Web Pages.pdf
2014-07-20 14:43
1.0M
Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf
2014-07-20 14:43
1.0M
Toward Black-Box Detection of Logic Flaws in Web Applications.pdf
2014-07-20 14:43
1.0M
A Kill Chain Analysis of the 2013 Target Data Breach.pdf
2014-07-20 14:43
1.0M
Eureka - A framework for enabling static malware analysis.pdf
2014-07-20 14:43
961K
Image Matching for Branding Phishing Kit Images.pdf
2014-07-20 14:43
952K
A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence.pdf
2014-07-20 14:43
937K
SigMal - A Static Signal Processing Based Malware Triage.pdf
2014-07-20 14:43
930K
Decoy Document Deployment for Effective Masquerade Attack Detection.pdf
2014-07-20 14:43
922K
Malware files clustering based on file geometry and visualization using R language.pdf
2014-07-20 14:43
913K
McPAD - A multiple classifier system for accurate payload-based anomaly detection.pdf
2014-07-20 14:43
883K
Detecting Traffic Snooping in Tor Using Decoys.pdf
2014-07-20 14:43
866K
Toward Stealthy Malware Detection.pdf
2014-07-20 14:43
861K
Demystifying service discovery - Implementing an internet-wide scanner.pdf
2014-07-20 14:43
814K
Investigating Advanced Persistent Threat 1 (APT1).pdf
2014-07-20 14:43
809K
Scalable fine-grained behavioral clustering of http-based malware.pdf
2014-07-20 14:43
798K
VAMO - Towards a Fully Automated Malware Clustering Validity Analysis.pdf
2014-07-20 14:43
788K
Spamming botnets - signatures and characteristics.pdf
2014-07-20 14:43
707K
The security of machine learning.pdf
2014-07-20 14:43
701K
From throw-away traffic to bots - detecting the rise of dga-based malware.pdf
2014-07-20 14:43
697K
Monitoring the Initial DNS Behavior of Malicious Domains.pdf
2014-07-20 14:43
678K
Risks and Realization of HTTPS Traffic Analysis.pdf
2014-07-20 14:43
673K
Measuring and Detecting Malware Downloads in Live Network Traffic.pdf
2014-07-20 14:43
663K
FIRMA - Malware Clustering and Network Signature Generation with Mixed Network Behaviors.pdf
2014-07-20 14:43
646K
CyberProbe - Towards Internet-Scale Active Detection of Malicious Servers.pdf
2014-07-20 14:43
636K
ZMap - Fast Internet-Wide Scanning and its Security Applications (slides).pdf
2014-07-20 14:43
607K
A static, packer-agnostic filter to detect similar malware samples.pdf
2014-07-20 14:43
600K
Beheading Hydras - Performing Effective Botnet Takedowns.pdf
2014-07-20 14:43
563K
Behavioral clustering of http-based malware and signature generation using malicious network traces.pdf
2014-07-20 14:43
562K
ZMap - Fast Internet-Wide Scanning and its Security Applications.pdf
2014-07-20 14:43
558K
Protecting a moving target - Addressing web application concept drift.pdf
2014-07-20 14:43
557K
The Tangled Web of Password Reuse.pdf
2014-07-20 14:43
541K
Local System Security via SSHD Instrumentation .pdf
2014-07-20 14:43
540K
EFFORT - Efficient and Effective Bot Malware Detection.pdf
2014-07-20 14:43
538K
Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine.pdf
2014-07-20 14:43
500K
Timing of Cyber Conflict.pdf
2014-07-20 14:43
490K
Effective Anomaly Detection with Scarce Training Data.pdf
2014-07-20 14:43
490K
Ampliï¬%81cation Hell - Revisiting Network Protocols for DDoS Abuse.pdf
2014-07-20 14:43
465K
A study of malcode-bearing documents.pdf
2014-07-20 14:43
454K
A survey on automated dynamic malware-analysis techniques and tools.pdf
2014-07-20 14:43
451K
Understanding the Domain Registration Behavior of Spammers.pdf
2014-07-20 14:43
448K
Deobfuscating Embedded Malware using Probable-Plaintext Attacks.pdf
2014-07-20 14:43
415K
ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection.pdf
2014-07-20 14:43
414K
Using File Relationships in Malware Classification.pdf
2014-07-20 14:43
408K
Shingled Graph Disassembly - Finding the Undecideable Path.pdf
2014-07-20 14:43
402K
On the infeasibility of modeling polymorphic shellcode.pdf
2014-07-20 14:43
399K
Automatic Analysis of Malware Behavior using Machine Learning.pdf
2014-07-20 14:43
398K
Indexing Million of Packets per Second using GPUs.pdf
2014-07-20 14:43
395K
Anonymous Hacking Group -- OpNewblood-Super-Secret-Security-Handbook.pdf
2014-07-20 14:43
389K
ReDeBug - finding unpatched code clones in entire os distributions.pdf
2014-07-20 14:43
388K
Cujo - Efficient detection and prevention of drive-by-download attacks.pdf
2014-07-20 14:43
381K
Casting out demons - Sanitizing training data for anomaly sensors.pdf
2014-07-20 14:43
376K
Attacker Economics for Internet-scale Vulnerability Risk Assessment.pdf
2014-07-20 14:43
347K
Tor vs NSA.pdf
2014-07-20 14:43
339K
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.pdf
2014-07-20 14:43
338K
Crawling BitTorrent DHTs for Fun and Proï¬%81t.pdf
2014-07-20 14:43
337K
On the Mismanagement and Maliciousness of Networks.pdf
2014-07-20 14:43
332K
Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks.pdf
2014-07-20 14:43
327K
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack.pdf
2014-07-20 14:43
326K
CAMP - Content Agnostic Malware Protection.pdf
2014-07-20 14:43
308K
Netgator - Malware Detection Using Program Interactive Challenges - slides.pdf
2014-07-20 14:43
306K
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild.pdf
2014-07-20 14:43
302K
Understanding the Network-Level Behavior of Spammers.pdf
2014-07-20 14:43
301K
Filtering Spam with Behavioral Blacklisting.pdf
2014-07-20 14:43
299K
Exposure - Finding malicious domains using passive dns analysis.pdf
2014-07-20 14:43
298K
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning.pdf
2014-07-20 14:43
297K
Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling.pdf
2014-07-20 14:43
285K
PAYL - Anomalous Payload-based Network Intrusion Detection.pdf
2014-07-20 14:43
285K
PAYL2 - Anomalous Payload-based Worm Detection and Signature Generation.pdf
2014-07-20 14:43
279K
CloudFence - Data Flow Tracking as a Cloud Service.pdf
2014-07-20 14:43
273K
Comparing anomaly detection techniques for HTTP.pdf
2014-07-20 14:43
267K
SinkMiner- Mining Botnet Sinkholes for Fun and Profit.pdf
2014-07-20 14:43
247K
Privacy-preserving payload-based correlation for accurate malicious traffic detection.pdf
2014-07-20 14:43
230K
Escape from Monkey Island - Evading High-Interaction Honeyclients.pdf
2014-07-20 14:43
225K
Spectrogram - A mixture-of-markov-chains model for anomaly detection in web traffic.pdf
2014-07-20 14:43
212K
Anomaly-based intrusion detection in software as a service.pdf
2014-07-20 14:43
204K
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework.pdf
2014-07-20 14:43
194K
N-Gram against the Machine - On the Feasibility of the N-Gram Network Analysis for Binary Protocols.pdf
2014-07-20 14:43
192K
Detecting unknown network attacks using language models.pdf
2014-07-20 14:43
190K
FLIPS - Hybrid Adaptive Intrusion Prevention.pdf
2014-07-20 14:43
189K
BitShred - Fast, Scalable Code Reuse Detection in Binary Code.pdf
2014-07-20 14:43
182K
Revealing Botnet Membership Using DNSBL Counter-Intelligence.pdf
2014-07-20 14:43
180K
FiG - Automatic Fingerprint Generation.pdf
2014-07-20 14:43
175K
Mobile Malware Detection Based on Energy Fingerprints â%80%94 A Dead End.pdf
2014-07-20 14:43
169K
Back to Basics - Beyond Network Hygiene.pdf
2014-07-20 14:43
168K
Outside the Closed World - On Using Machine Learning For Network Intrusion Detection.pdf
2014-07-20 14:43
158K
Traffic aggregation for malware detection.pdf
2014-07-20 14:43
149K
FuncTracker - Discovering Shared Code to Aid Malware Forensics Extended Abstract.pdf
2014-07-20 14:43
148K
Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation.pdf
2014-07-20 14:43
140K
The Classification of Valuable Data in an Assumption of Breach Paradigm.pdf
2014-07-20 14:43
133K
MISHIMA - Multilateration of Internet hosts hidden using malicious fast-ï¬%82ux agents.pdf
2014-07-20 14:43
124K
Sherlock Holmes and The Case of the Advanced Persistent Threat.pdf
2014-07-20 14:43
88K
Machine learning in adversarial environments.pdf
2014-07-20 14:43
47K
Apache/2.4.25 (Debian) Server at diyhpl.us Port 80