Extracting certificates from live traffic: A near real-time SSL notary service B Amann, M Vallentin, S Hall, R Sommer Technical Report TR-12-014, ICSI, 2012 | 52 | 2012 |
No attack necessary: The surprising dynamics of SSL trust relationships J Amann, R Sommer, M Vallentin, S Hall Proceedings of the 29th annual computer security applications conference …, 2013 | 51 | 2013 |
Spicy: a unified deep packet inspection framework for safely dissecting all your data R Sommer, J Amann, S Hall Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 32* | 2016 |
Revisiting SSL: A large-scale study of the internet’s most trusted protocol B Amann, M Vallentin, S Hall, R Sommer ICSI, Tech. Rep., 2012 | 31 | 2012 |
The bro network security monitor V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ... Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2017 | 30 | 2017 |
A lone wolf no more: Supporting network intrusion detection with real-time intelligence J Amann, R Sommer, A Sharma, S Hall Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 25 | 2012 |
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks J Amann, S Hall, R Sommer | 14* | |
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates J Amann, R Sommer, M Vallentin, S Hall Tiny Trans. Comput. Sci. 3, 2015 | | 2015 |
The structure of the anticancer compoundN-1′-ethyl-1, 8-naphthaloimide-2′-dimethyl ammonium chloride, and the structures of its PtCl42− and PtCl62− salts GR Clark, SB Hall Acta Crystallographica Section A 43, C55-C55, 1987 | | 1987 |