When Sally Met Trackers: Web Tracking From the Users' Perspective | 0 | 0.34 | 2022 |
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships | 0 | 0.34 | 2022 |
Does Every Second Count? Time-Based Evolution Of Malware Behavior In Sandboxes | 1 | 0.35 | 2021 |
When Malware Changed Its Mind - An Empirical Study of Variable Program Behaviors in the Real World. | 0 | 0.34 | 2021 |
How Did That Get In My Phone? Unwanted App Distribution on Android Devices | 1 | 0.34 | 2021 |
SoK: Cyber Insurance – Technical Challenges and a System Security Roadmap | 1 | 0.35 | 2020 |
The Tangled Genealogy of IoT Malware. | 3 | 0.39 | 2020 |
Can I Opt Out Yet? - GDPR and the Global Illusion of Cookie Control. | 5 | 0.42 | 2019 |
Mind Your Own Business - A Longitudinal Study of Threats and Vulnerabilities in Enterprises. | 0 | 0.34 | 2019 |
Spearphishing Malware: Do We Really Know The Unknown? | 0 | 0.34 | 2018 |
RiskTeller: Predicting the Risk of Cyber Incidents. | 7 | 0.46 | 2017 |
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. | 4 | 0.45 | 2017 |
Measuring Pup Prevalence And Pup Distribution Through Pay-Per-Install Services | 12 | 0.72 | 2016 |
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence | 12 | 0.55 | 2015 |
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics | 28 | 0.99 | 2015 |
Cutting the gordian knot: A look under the hood of ransomware attacks | 57 | 3.02 | 2015 |
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks | 7 | 0.59 | 2015 |
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching | 29 | 1.32 | 2015 |
On the effectiveness of risk prediction based on users browsing behavior | 13 | 0.77 | 2014 |
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains | 52 | 1.88 | 2014 |
Investigating Zero-Day Attacks. | 0 | 0.34 | 2013 |
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis | 77 | 2.68 | 2012 |
Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat | 17 | 1.15 | 2012 |
Before we knew it: an empirical study of zero-day attacks in the real world | 126 | 5.04 | 2012 |
Thwarting real-time dynamic unpacking | 2 | 0.41 | 2011 |
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. | 59 | 2.50 | 2011 |
G-Free: defeating return-oriented programming through gadget-less binaries | 108 | 3.98 | 2010 |
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms | 17 | 1.06 | 2010 |
All your contacts are belong to us: automated identity theft attacks on social networks | 240 | 10.63 | 2009 |
Automatically generating models for botnet detection | 33 | 1.71 | 2009 |