Follow
Matthias Vallentin
Matthias Vallentin
Tenzir
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
M Vallentin, R Sommer, J Lee, C Leres, V Paxson, B Tierney
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
2122007
Here's my cert, so trust me, maybe? Understanding TLS errors on the web
D Akhawe, J Amann, M Vallentin, R Sommer
Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013
1362013
Extracting certificates from live traffic: A near real-time SSL notary service
B Amann, M Vallentin, S Hall, R Sommer
Technical Report TR-12-014, ICSI, 2012
522012
No attack necessary: The surprising dynamics of SSL trust relationships
J Amann, R Sommer, M Vallentin, S Hall
Proceedings of the 29th annual computer security applications conference …, 2013
512013
Computing security in the developing world: A case for multidisciplinary research
Y Ben-David, S Hasan, J Pal, M Vallentin, S Panjwani, P Gutheim, J Chen, ...
Proceedings of the 5th ACM workshop on Networked systems for developing …, 2011
442011
JaldiMAC: taking the distance further
Y Ben-David, M Vallentin, S Fowler, E Brewer
Proceedings of the 4th ACM workshop on networked systems for developing …, 2010
402010
{VAST}: A Unified Platform for Interactive Network Forensics
M Vallentin, V Paxson, R Sommer
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016
382016
An assessment of overt malicious activity manifest in residential networks
G Maier, A Feldmann, V Paxson, R Sommer, M Vallentin
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011
342011
Revisiting SSL: A large-scale study of the internet’s most trusted protocol
B Amann, M Vallentin, S Hall, R Sommer
ICSI, Tech. Rep., 2012
312012
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2017
302017
Multi-stage attack detection via kill chain state machines
F Wilkens, F Ortmann, S Haas, M Vallentin, M Fischer
Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 13-24, 2021
292021
Hilti: An abstract execution environment for deep, stateful network traffic analysis
R Sommer, M Vallentin, L De Carli, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 461-474, 2014
292014
Native actors: how to scale network forensics
M Vallentin, D Charousset, TC Schmidt, V Paxson, M Wählisch
Proceedings of the 2014 ACM conference on SIGCOMM, 141-142, 2014
102014
Persistent browser cache poisoning
M Vallentin, Y Ben-David
Song. Spring10. attack-project. pdf, 2010
72010
Scalable network forensics
M Vallentin
UC Berkeley, 2016
32016
Quantifying persistent browser cache poisoning
M Vallentin, Y Ben-David
22014
HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis
R Sommer, LD CARLI, N Kothari, M Vallentin, V Paxson
Tech. Rep. TR-12-003, ICSI, 2012
22012
The Gh0st in the Shell: Network Security in the Himalayas
M Vallentin, J Whiteaker, Y Ben-David
UC Berkeley, http://cs. berkeley. edu/~ mavam/cw/cs294-28-paper. pdf …, 2009
22009
SOVEREIGN-Towards a Holistic Approach to Critical Infrastructure Protection
G Becker, T Eisenbarth, H Federrath, M Fischer, N Loose, S Ott, J Pecholt, ...
Proceedings of the 19th International Conference on Availability …, 2024
2024
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates
J Amann, R Sommer, M Vallentin, S Hall
Tiny Trans. Comput. Sci. 3, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20