Manos Antonakakis
Manos Antonakakis
Email verificata su - Home page
TitoloCitata daAnno
Building a dynamic reputation system for dns.
M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster
USENIX security symposium, 273-290, 2010
From throw-away traffic to bots: detecting the rise of DGA-based malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Securityá…, 2012
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1093-1110, 2017
Detecting Malware Domains at the Upper DNS Hierarchy.
M Antonakakis, R Perdisci, W Lee, N Vasiloglou, D Dagon
USENIX security symposium 11, 1-16, 2011
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
D Dagon, M Antonakakis, P Vixie, T Jinmei, W Lee
Proceedings of the 15th ACM conference on Computer and communicationsá…, 2008
Method and system for detecting malware
US Patent 10,257,212, 2019
Method and system for detecting malicious domain names at an upper DNS hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou
US Patent 8,631,489, 2014
Method and system for detecting malware
E Antonakakis, R Perdisci, W Lee, G Ollmann
US Patent 8,578,497, 2013
Detecting critical nodes for MANET intrusion detection systems
A Karygiannis, E Antonakakis, A Apostolopoulos
Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006á…, 2006
Method and system for determining whether domain names are legitimate or malicious
M Antonakakis, R Perdisci, D Dagon, W Lee
US Patent 9,516,058, 2016
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks
B Rahbarinia, R Perdisci, M Antonakakis
2015 45th Annual IEEE/IFIP International Conference on Dependable Systemsá…, 2015
Electromagnetic signatures of WLAN cards and network security
KA Remley, CA Grosvenor, RT Johnk, DR Novotny, PD Hale, ...
Proceedings of the Fifth IEEE International Symposium on Signal Processingá…, 2005
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Webwitness: Investigating, categorizing, and mitigating malware download paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th {USENIX} Security Symposium ({USENIX} Security 15), 1025-1040, 2015
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks
R Perdisci, M Antonakakis, X Luo, W Lee
2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 3-12, 2009
A centralized monitoring infrastructure for improving DNS security
M Antonakakis, D Dagon, X Luo, R Perdisci, W Lee, J Bellmor
International Workshop on Recent Advances in Intrusion Detection, 18-37, 2010
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gˇmez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
Measuring and detecting malware downloads in live network traffic
P Vadrevu, B Rahbarinia, R Perdisci, K Li, M Antonakakis
European Symposium on Research in Computer Security, 556-573, 2013
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20