Segui
Matthias Vallentin
Matthias Vallentin
Tenzir
Email verificata su berkeley.edu - Home page
Titolo
Citata da
Citata da
Anno
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
M Vallentin, R Sommer, J Lee, C Leres, V Paxson, B Tierney
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
2102007
Here's my cert, so trust me, maybe? Understanding TLS errors on the web
D Akhawe, J Amann, M Vallentin, R Sommer
Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013
1322013
Extracting certificates from live traffic: A near real-time SSL notary service
B Amann, M Vallentin, S Hall, R Sommer
Technical Report TR-12-014, ICSI, 2012
512012
No attack necessary: The surprising dynamics of SSL trust relationships
J Amann, R Sommer, M Vallentin, S Hall
Proceedings of the 29th annual computer security applications conference …, 2013
482013
Computing security in the developing world: A case for multidisciplinary research
Y Ben-David, S Hasan, J Pal, M Vallentin, S Panjwani, P Gutheim, J Chen, ...
Proceedings of the 5th ACM workshop on Networked systems for developing …, 2011
422011
JaldiMAC: taking the distance further
Y Ben-David, M Vallentin, S Fowler, E Brewer
Proceedings of the 4th ACM workshop on networked systems for developing …, 2010
402010
{VAST}: A Unified Platform for Interactive Network Forensics
M Vallentin, V Paxson, R Sommer
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016
382016
An assessment of overt malicious activity manifest in residential networks
G Maier, A Feldmann, V Paxson, R Sommer, M Vallentin
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011
362011
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2012
322012
Revisiting SSL: A large-scale study of the internet’s most trusted protocol
B Amann, M Vallentin, S Hall, R Sommer
ICSI, Tech. Rep., 2012
292012
HILTI: An abstract execution environment for deep, stateful network traffic analysis
R Sommer, M Vallentin, L De Carli, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 461-474, 2014
272014
Multi-stage attack detection via kill chain state machines
F Wilkens, F Ortmann, S Haas, M Vallentin, M Fischer
Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 13-24, 2021
212021
Native actors: how to scale network forensics
M Vallentin, D Charousset, TC Schmidt, V Paxson, M Wählisch
Proceedings of the 2014 ACM conference on SIGCOMM, 141-142, 2014
92014
Persistent browser cache poisoning
M Vallentin, Y Ben-David
Song. Spring10. attack-project. pdf, 2010
72010
Scalable network forensics
M Vallentin
UC Berkeley, 2016
32016
Quantifying persistent browser cache poisoning
M Vallentin, Y Ben-David
22014
HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis
R Sommer, LD CARLI, N Kothari, M Vallentin, V Paxson
Tech. Rep. TR-12-003, ICSI, 2012
22012
The Gh0st in the Shell: Network Security in the Himalayas
M Vallentin, J Whiteaker, Y Ben-David
UC Berkeley, http://cs. berkeley. edu/~ mavam/cw/cs294-28-paper. pdf …, 2009
22009
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates
J Amann, R Sommer, M Vallentin, S Hall
Tiny Trans. Comput. Sci. 3, 2015
2015
VAST: Visibility Across Space and Time
M Vallentin, H Sharma
2014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20