The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware M Vallentin, R Sommer, J Lee, C Leres, V Paxson, B Tierney Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 212 | 2007 |
Here's my cert, so trust me, maybe? Understanding TLS errors on the web D Akhawe, J Amann, M Vallentin, R Sommer Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013 | 136 | 2013 |
Extracting certificates from live traffic: A near real-time SSL notary service B Amann, M Vallentin, S Hall, R Sommer Technical Report TR-12-014, ICSI, 2012 | 52 | 2012 |
No attack necessary: The surprising dynamics of SSL trust relationships J Amann, R Sommer, M Vallentin, S Hall Proceedings of the 29th annual computer security applications conference …, 2013 | 51 | 2013 |
Computing security in the developing world: A case for multidisciplinary research Y Ben-David, S Hasan, J Pal, M Vallentin, S Panjwani, P Gutheim, J Chen, ... Proceedings of the 5th ACM workshop on Networked systems for developing …, 2011 | 44 | 2011 |
JaldiMAC: taking the distance further Y Ben-David, M Vallentin, S Fowler, E Brewer Proceedings of the 4th ACM workshop on networked systems for developing …, 2010 | 40 | 2010 |
{VAST}: A Unified Platform for Interactive Network Forensics M Vallentin, V Paxson, R Sommer 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016 | 38 | 2016 |
An assessment of overt malicious activity manifest in residential networks G Maier, A Feldmann, V Paxson, R Sommer, M Vallentin Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011 | 34 | 2011 |
Revisiting SSL: A large-scale study of the internet’s most trusted protocol B Amann, M Vallentin, S Hall, R Sommer ICSI, Tech. Rep., 2012 | 31 | 2012 |
The bro network security monitor V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ... Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2017 | 30 | 2017 |
Multi-stage attack detection via kill chain state machines F Wilkens, F Ortmann, S Haas, M Vallentin, M Fischer Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 13-24, 2021 | 29 | 2021 |
Hilti: An abstract execution environment for deep, stateful network traffic analysis R Sommer, M Vallentin, L De Carli, V Paxson Proceedings of the 2014 Conference on Internet Measurement Conference, 461-474, 2014 | 29 | 2014 |
Native actors: how to scale network forensics M Vallentin, D Charousset, TC Schmidt, V Paxson, M Wählisch Proceedings of the 2014 ACM conference on SIGCOMM, 141-142, 2014 | 10 | 2014 |
Persistent browser cache poisoning M Vallentin, Y Ben-David Song. Spring10. attack-project. pdf, 2010 | 7 | 2010 |
Scalable network forensics M Vallentin UC Berkeley, 2016 | 3 | 2016 |
Quantifying persistent browser cache poisoning M Vallentin, Y Ben-David | 2 | 2014 |
HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis R Sommer, LD CARLI, N Kothari, M Vallentin, V Paxson Tech. Rep. TR-12-003, ICSI, 2012 | 2 | 2012 |
The Gh0st in the Shell: Network Security in the Himalayas M Vallentin, J Whiteaker, Y Ben-David UC Berkeley, http://cs. berkeley. edu/~ mavam/cw/cs294-28-paper. pdf …, 2009 | 2 | 2009 |
SOVEREIGN-Towards a Holistic Approach to Critical Infrastructure Protection G Becker, T Eisenbarth, H Federrath, M Fischer, N Loose, S Ott, J Pecholt, ... Proceedings of the 19th International Conference on Availability …, 2024 | | 2024 |
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates J Amann, R Sommer, M Vallentin, S Hall Tiny Trans. Comput. Sci. 3, 2015 | | 2015 |