Manos Antonakakis
Manos Antonakakis
Verified email at - Homepage
Cited by
Cited by
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017
Building a dynamic reputation system for dns.
M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster
USENIX security symposium, 273-290, 2010
From throw-away traffic to bots: detecting the rise of DGA-based malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
Detecting Malware Domains at the Upper DNS Hierarchy.
M Antonakakis, R Perdisci, W Lee, N Vasiloglou, D Dagon
USENIX security symposium 11, 1-16, 2011
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
D Dagon, M Antonakakis, P Vixie, T Jinmei, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE Symposium on Security and Privacy (SP), 1362-1380, 2019
Method and system for detecting malicious domain names at an upper DNS hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou
US Patent 8,631,489, 2014
Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks
B Rahbarinia, R Perdisci, M Antonakakis
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
Method and system for detecting malware
E Antonakakis, R Perdisci, W Lee, G Ollmann
US Patent 8,578,497, 2013
Detecting critical nodes for MANET intrusion detection systems
A Karygiannis, E Antonakakis, A Apostolopoulos
Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006 …, 2006
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Electromagnetic signatures of WLAN cards and network security
KA Remley, CA Grosvenor, RT Johnk, DR Novotny, PD Hale, ...
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Method and system for determining whether domain names are legitimate or malicious
M Antonakakis, R Perdisci, D Dagon, W Lee
US Patent 9,516,058, 2016
Webwitness: Investigating, categorizing, and mitigating malware download paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th {USENIX} Security Symposium ({USENIX} Security 15), 1025-1040, 2015
Domain-Z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks
R Perdisci, M Antonakakis, X Luo, W Lee
2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 3-12, 2009
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
A centralized monitoring infrastructure for improving DNS security
M Antonakakis, D Dagon, X Luo, R Perdisci, W Lee, J Bellmor
International Workshop on Recent Advances in Intrusion Detection, 18-37, 2010
The system can't perform the operation now. Try again later.
Articles 1–20