From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ... | 756* | |
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. Y Nadji, P Saxena, D Song NDSS 20, 2009 | 284 | 2009 |
Beheading hydras: performing effective botnet takedowns Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 104 | 2013 |
Practical attacks against graph-based clustering Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ... Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 100 | 2017 |
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis 2016 IEEE symposium on security and privacy (SP), 691-706, 2016 | 100 | 2016 |
Enabling network security through active DNS datasets A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ... Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 93 | 2016 |
DNS noise: Measuring the pervasiveness of disposable domains in modern DNS traffic Y Chen, M Antonakakis, R Perdisci, Y Nadji, D Dagon, W Lee 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 68 | 2014 |
Automated remote repair for mobile malware Y Nadji, J Giffin, P Traynor Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 64 | 2011 |
Connected colors: Unveiling the structure of criminal networks Y Nadji, M Antonakakis, R Perdisci, W Lee Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013 | 36 | 2013 |
MalwareVis: entity-based visualization of malware network traces W Zhuo, Y Nadjin Proceedings of the ninth international symposium on visualization for cyber …, 2012 | 34 | 2012 |
Just awful enough: the functional dysfunction of the something awful forums JA Pater, Y Nadji, ED Mynatt, AS Bruckman Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 32 | 2014 |
Understanding the privacy implications of ecs P Kintis, Y Nadji, D Dagon, M Farrell, M Antonakakis Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 29 | 2016 |
Towards designing effective visualizations for DNS-based network threat analysis R Romero-Gomez, Y Nadji, M Antonakakis 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017 | 23 | 2017 |
Understanding the Prevalence and Use of Alternative Plans in Malware with Network Games Y Nadji, M Antonakakis, R Perdisci, W Lee | 23 | 2011 |
Financial Lower Bounds of Online Advertising Abuse: A Four Year Case Study of the TDSS/TDL4 Botnet Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, W Lee, M Farrell Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 21 | 2016 |
Still beheading hydras: Botnet takedowns then and now Y Nadji, R Perdisci, M Antonakakis IEEE Transactions on Dependable and Secure Computing 14 (5), 535-549, 2015 | 21 | 2015 |
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 botnet Y Chen, P Kintis, M Antonakakis, Y Nadji, D Dagon, M Farrell Computers & Security 67, 164-180, 2017 | 11 | 2017 |
Measuring network reputation in the ad-bidding process Y Chen, Y Nadji, R Romero-Gómez, M Antonakakis, D Dagon Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 10 | 2017 |
See no evil: Evasions in honeymonkey systems B Dolan-Gavitt, Y Nadji Technical report, Technical Report, 2010 | 7 | 2010 |
Understanding DNS-Based Criminal Infrastructure for Informing Takedowns YI Nadji Ph. D. Thesis, 2015 | 3 | 2015 |