Leyla Bilge
Leyla Bilge
Email verificata su symantec.com
TitoloCitata daAnno
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
5912009
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
5262011
Before we knew it: an empirical study of zero-day attacks in the real world
L Bilge, T Dumitraş
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3752012
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th Annual Computer Security Applications Conference, 49-58, 2010
2652010
Cutting the gordian knot: A look under the hood of ransomware attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
International Conference on Detection of Intrusions and Malware, and …, 2015
2252015
Automatically generating models for botnet detection
P Wurzinger, L Bilge, T Holz, J Goebel, C Kruegel, E Kirda
European symposium on research in computer security, 232-249, 2009
2112009
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2092012
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 14, 2014
1382014
Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat
O Thonnard, L Bilge, G O’Gorman, S Kiernan, M Lee
International workshop on recent advances in intrusion detection, 64-85, 2012
772012
The attack of the clones: A study of the impact of shared code on vulnerability patching
A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras
2015 IEEE symposium on security and privacy, 692-708, 2015
752015
The dropper effect: Insights into malware distribution with downloader graph analytics
BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitraş
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
562015
On the effectiveness of risk prediction based on users browsing behavior
D Canali, L Bilge, D Balzarotti
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
452014
Measuring {PUP} Prevalence and {PUP} Distribution through Pay-Per-Install Services
P Kotzias, L Bilge, J Caballero
25th {USENIX} Security Symposium ({USENIX} Security 16), 739-756, 2016
362016
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 1057-1072, 2015
362015
Captcha smuggling: hijacking web browsing sessions to create captcha farms
M Egele, L Bilge, E Kirda, C Kruegel
Proceedings of the 2010 ACM Symposium on Applied Computing, 1865-1870, 2010
362010
Are you at risk? Profiling organizations and individuals subject to targeted attacks
O Thonnard, L Bilge, A Kashyap, M Lee
International Conference on Financial Cryptography and Data Security, 13-31, 2015
222015
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
182017
Thwarting real-time dynamic unpacking
L Bilge, A Lanzi, D Balzarotti
Proceedings of the Fourth European Workshop on System Security, 5, 2011
112011
Lean on me: Mining internet service dependencies from large-scale dns data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
42017
Investigating zero-day attacks
L Bilge, T Dumitras
login: the USENIX magazine 38 (4), 6-12, 2013
42013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20