Corrado Leita
Corrado Leita
Lastline Inc.
Verified email at - Homepage
Cited by
Cited by
Scriptgen: an automated script generation tool for honeyd
C Leita, K Mermoud, M Dacier
Computer Security Applications Conference, 21st Annual, 12 pp.-214, 2005
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
C Leita, M Dacier, F Massicotte
Recent Advances in Intrusion Detection, 185-205, 2006
An analysis of rogue AV campaigns
M Cova, C Leita, O Thonnard, A Keromytis, M Dacier
Recent Advances in Intrusion Detection, 442-463, 2011
SGNET: a worldwide deployable framework to support the analysis of malware threat models
C Leita, M Dacier
Dependable Computing Conference, 2008. EDCC 2008. Seventh European, 99-109, 2008
Large scale malware collection: lessons learned
J Canto, M Dacier, E Kirda, C Leita
IEEE SRDS Workshop on Sharing Field Data and Experiment Measurements on …, 2008
An experimental study of diversity with off-the-shelf antivirus engines
I Gashi, V Stankovic, C Leita, O Thonnard
2009 Eighth IEEE international symposium on network computing and …, 2009
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, ES Ramirez, F Pouget, E Kirda, M Dacier
Information Security Threats Data Collection and Sharing, 2008. WISTDCS'08 …, 2008
Towards Network Containment in Malware Analysis Systems
M Graziano, C Leita, D Balzarotti
Annual Computer Security Applications Conference (ACSAC) 2012, 2012
Exploiting diverse observation perspectives to get insights on the malware landscape
C Leita, U Bayer, E Kirda
Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International …, 2010
HARMUR: Storing and analyzing historic data on malicious domains
C Leita, M Cova
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
SGNET: Implementation Insights
C Leita, M Dacier
Network Operations and Management Symposium, 2008. NOMS 2008. IEEE, 1075-1078, 2008
SGNET: a distributed infrastructure to handle zero-day exploits
C Leita, M Dacier, G Wicherski
Institut Eurecom, France, Tech. Rep. EURECOM 2164, 2007
SGNET: automated protocol learning for the observation of malicious threats
C Leita
Creating Collaborative Applications Using the Fluid Computing Middleware
C Leita
IBM Zurich Research Laboratory, 2005
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
S Almotairi, A Clark, M Dacier, C Leita, G Mohay, VH Pham, O Thonnard, ...
School of Computer and Information Science, Edith Cowan University, Perth …, 2007
Heuristics-based protocol labeling for industrial control systems
C Leita, M Dacier
US Patent 9,384,066, 2016
Symantec report on rogue security software
M Fossi, D Turner, E Johnson, T Mack, T Adams, J Blackbird, M Low, ...
Whitepaper, Symantec, October, 2009
Assessing cybercrime through the eyes of the WOMBAT
M Dacier, C Leita, O Thonnard, H Van Pham, E Kirda
Cyber Situational Awareness: Issues and Research, 103-136, 2009
Gone rogue: An analysis of rogue security software campaigns
M Cova, C Leita, O Thonnard, A Keromytis, M Dacier
2009 European Conference on Computer Network Defense, 1-3, 2009
Server-side code injection attacks: A historical perspective
J Fritz, C Leita, M Polychronakis
International Workshop on Recent Advances in Intrusion Detection, 41-61, 2013
The system can't perform the operation now. Try again later.
Articles 1–20