Brett Stone-Gross
Cited by
Cited by
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
B Stone-Gross, T Holz, G Stringhini, G Vigna
LEET 11, 4-4, 2011
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
2013 IEEE Symposium on Security and Privacy, 97-111, 2013
The underground economy of fake antivirus software
B Stone-Gross, R Abman, RA Kemmerer, C Kruegel, DG Steigerwald, ...
Economics of information security and privacy III, 55-78, 2013
Hulk: Eliciting malicious behavior in browser extensions
A Kapravelos, C Grier, N Chachra, C Kruegel, G Vigna, V Paxson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 641-654, 2014
Fire: Finding rogue networks
B Stone-Gross, C Kruegel, K Almeroth, A Moser, E Kirda
2009 Annual Computer Security Applications Conference, 231-240, 2009
Understanding fraudulent activities in online ad exchanges
B Stone-Gross, R Stevens, A Zarras, R Kemmerer, C Kruegel, G Vigna
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
Analysis of a botnet takeover
B Stone-Gross, M Cova, B Gilbert, R Kemmerer, C Kruegel, G Vigna
IEEE Security & Privacy 9 (1), 64-72, 2010
BOTMAGNIFIER: Locating Spambots on the Internet.
G Stringhini, T Holz, B Stone-Gross, C Kruegel, G Vigna
USENIX security symposium, 1-32, 2011
Two years of short urls internet measurement: security threats and countermeasures
F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ...
proceedings of the 22nd international conference on World Wide Web, 861-872, 2013
MIST: Cellular data network measurement for mobile applications
MP Wittie, B Stone-Gross, KC Almeroth, EM Belding
2007 Fourth International Conference on Broadband Communications, Networks …, 2007
Peering through the iframe
B Stone-Gross, M Cova, C Kruegel, G Vigna
2011 Proceedings IEEE INFOCOM, 411-415, 2011
Malware in IEEE 802.11 wireless networks
B Stone-Gross, C Wilson, K Almeroth, E Belding, H Zheng, ...
International Conference on Passive and Active Network Measurement, 222-231, 2008
The lifecycle of peer-to-peer (gameover) zeus
B Stone-Gross
Tech. rep., Dell Secure Works, 2012
VeriKey: A dynamic certificate verification system for public key exchanges
B Stone-Gross, D Sigal, R Cohn, J Morse, K Almeroth, C Kruegel
International Conference on Detection of Intrusions and Malware, and …, 2008
The underground economy of fake antivirus software
D Steigerwald, G Vigna, C Kruegel, R Kemmerer, R Abman, ...
Measures to understand and thwart organized cybercrime
B Stone-Gross
University of California at Santa Barbara, 2011
Peer-to-Peer Botnet.
RS Abdullah, NA Abu, MA Faizal, ZAM Noh, HR Zeidanloo, ...
Research Journal of Information Technology 6 (3), pp: 158-162, 2012
A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns
B Stone-Gross, T Holz, G Stringhini, G Vigna
GSWC 2011, 29, 2011
The system can't perform the operation now. Try again later.
Articles 1–20