Understanding the mirai botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... 26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017 | 2583 | 2017 |
Sok: Security evaluation of home-based iot deployments O Alrawi, C Lever, M Antonakakis, F Monrose 2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019 | 501 | 2019 |
Hiding in plain sight: A longitudinal study of combosquatting abuse P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 168 | 2017 |
Outguard: Detecting in-browser covert cryptocurrency mining in the wild A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ... The World Wide Web Conference, 840-852, 2019 | 115 | 2019 |
A lustrum of malware network communication: Evolution and insights C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis 2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017 | 107 | 2017 |
Domain-Z: 28 Registration Later - Measuring the Exploitation of Residual Trust in Domains C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis 2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016 | 99 | 2016 |
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers C Lever, M Antonakakis, B Reaves, P Traynor, W Lee 20th Annual Network & Distributed System Security Symposium, 2013 | 98 | 2013 |
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle O Alrawi, C Lever, K Valakuzhy, K Snow, F Monrose, M Antonakakis 30th USENIX Security Symposium (USENIX Security 21), 3505-3522, 2021 | 97 | 2021 |
Enabling Network Security Through Active DNS Datasets A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ... International Symposium on Research in Attacks, Intrusions, and Defenses, 2016 | 93 | 2016 |
Whitewash: Outsourcing garbled circuit generation for mobile devices H Carter, C Lever, P Traynor Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 68 | 2014 |
Security in plain txt: Observing the use of dns txt records in the wild A Portier, H Carter, C Lever Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 11 | 2019 |
Graph mining of motif profiles for computer network activity inference W Turkett, E Fulp, C Lever, JE Allan Ninth Workshop on Mining and Learning with Graphs, 2011 | 11 | 2011 |
Understanding the Growth and Security Considerations of ECS. A Kountouras, P Kintis, A Avgetidis, T Papastergiou, C Lever, ... NDSS, 2021 | 7 | 2021 |
View from above: exploring the malware ecosystem from the upper DNS hierarchy A Faulkenberry, A Avgetidis, Z Ma, O Alrawi, C Lever, P Kintis, F Monrose, ... Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 5 | 2022 |
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators A Avgetidis, O Alrawi, K Valakuzhy, C Lever, P Burbage, AD Keromytis, ... 32nd USENIX security symposium (USENIX Security 23), 5307-5324, 2023 | 4 | 2023 |
Hiding in plain sight P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 2 | 2017 |
Dawn of the dead domain: Measuring the exploitation of residual trust in domains C Lever, RJ Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis IEEE Security & Privacy 15 (2), 70-77, 2017 | 2 | 2017 |
Domain-Z: 28 Registrations Later C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis | 2 | |
EMPIRICAL ANALYSIS OF EXISTING AND EMERGING THREATS AT SCALE USING DNS C Lever Georgia Institute of Technology, 2018 | | 2018 |
Network Application Classification Using Motif Coloring C Lever Wake Forest University, 2014 | | 2014 |