Beehive: Large-scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda Annual Computer Security Applications Conference (ACSAC), 2013 | 396 | 2013 |
G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda Annual Computer Security Applications Conference (ACSAC), 2010 | 383 | 2010 |
Anomaly sensor framework for detecting advanced persistent threat attacks TF Yen, A Juels, A Kuppa, K Onarlioglu, A Oprea US Patent 9,378,361, 2016 | 124 | 2016 |
Toward Robust Hidden Volumes using Write-Only Oblivious RAM EO Blass, T Mayberry, G Noubir, K Onarlioglu ACM Conference on Computer and Communications Security (CCS), 2014 | 84 | 2014 |
Behavioral detection of suspicious host activities in an enterprise TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda US Patent 9,516,039, 2016 | 70 | 2016 |
Insights into User Behavior in Dealing with Internet Attacks. K Onarlioglu, UO Yilmaz, E Kirda, D Balzarotti Network and Distributed System Security Symposium (NDSS), 2012 | 59 | 2012 |
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting T Lauinger, M Szydlowski, K Onarlioglu, G Wondracek, E Kirda, C Kruegel Network and Distributed System Security Symposium (NDSS), 2013 | 45 | 2013 |
WHOIS Lost in Translation: (Mis) Understanding Domain Name Expiration and Re-Registration T Lauinger, K Onarlioglu, A Chaabane, W Robertson, E Kirda ACM Internet Measurement Conference (IMC), 2016 | 40 | 2016 |
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers T Lauinger, A Chaabane, AS Buyukkayhan, K Onarlioglu, W Robertson USENIX Security Symposium, 2017 | 39 | 2017 |
Cached and Confused: Web Cache Deception in the Wild SA Mirheidari, S Arshad, K Onarlioglu, B Crispo, E Kirda, W Robertson USENIX Security Symposium, 2020 | 37 | 2020 |
PrivExec: Private Execution as an Operating System Service K Onarlioglu, C Mulliner, W Robertson, E Kirda IEEE Symposium on Security and Privacy, 2013 | 36 | 2013 |
Detecting suspicious web traffic from an enterprise network TF Yen, A Oprea, K Onarlioglu US Patent 9,049,221, 2015 | 35 | 2015 |
T-Reqs: HTTP Request Smuggling with Differential Fuzzing B Jabiyev, S Sprecher, K Onarlioglu, E Kirda ACM Conference on Computer and Communications Security (CCS), 2021 | 33 | 2021 |
Trellis: Privilege Separation for Multi-User Applications Made Easy A Mambretti, K Onarlioglu, C Mulliner, W Robertson, E Kirda, F Maggi, ... International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2016 | 26* | 2016 |
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities AS Buyukkayhan, K Onarlioglu, W Robertson, E Kirda Network and Distributed System Security Symposium (NDSS), 2016 | 22 | 2016 |
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems K Onarlioglu, W Robertson, E Kirda IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016 | 19 | 2016 |
Sentinel: Securing Legacy Firefox Extensions K Onarlioglu, AS Buyukkayhan, W Robertson, E Kirda Computers & Security 49, 147-161, 2015 | 19 | 2015 |
Securing Legacy Firefox Extensions with Sentinel K Onarlioglu, M Battal, W Robertson, E Kirda Conference on Detection of Intrusions and Malware & Vulnerability Assessment …, 2013 | 18 | 2013 |
Web Cache Deception Escalates! SA Mirheidari, M Golinelli, K Onarlioglu, E Kirda, B Crispo USENIX Security Symposium, 2022 | 16 | 2022 |
TrueClick: Automatically Distinguishing Trick Banners from Genuine Download Links S Duman, K Onarlioglu, AO Ulusoy, W Robertson, E Kirda Annual Computer Security Applications Conference (ACSAC), 2014 | 16 | 2014 |