Chaz Lever
Chaz Lever
Email verificata su gatech.edu - Home page
TitoloCitata daAnno
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1093-1110, 2017
4402017
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
20th Annual Network & Distributed System Security Symposium, 2013
762013
Whitewash: Outsourcing garbled circuit generation for mobile devices
H Carter, C Lever, P Traynor
Proceedings of the 30th Annual Computer Security Applications Conferenceá…, 2014
522014
Domain-Z: 28 Registration Later - Measuring the Exploitation of Residual Trust in Domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
44*2016
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gˇmez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
402017
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
402017
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
IEEE S&P, 208-226, 2019
372019
Enabling Network Security Through Active DNS Datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 2016
262016
Graph mining of motif profiles for computer network activity inference
W Turkett, E Fulp, C Lever, JE Allan
Ninth Workshop on Mining and Learning with Graphs, 2011
82011
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
62019
Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains
C Lever, RJ Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
IEEE Security & Privacy 15 (2), 70-77, 2017
12017
Security in Plain TXT
A Portier, H Carter, C Lever
International Conference on Detection of Intrusions and Malware, andá…, 2019
2019
Empirical analysis of existing and emerging threats at scale using DNS
CC Lever
Georgia Institute of Technology, 2018
2018
A LUSTRUM OF MALWARE NETWORK COMMUNICATION
C LEVER
2017
Network Application Classification Using Motif Coloring
C Lever
Wake Forest University, 2014
2014
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–15