Understanding the mirai botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... 26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017 | 2499 | 2017 |
From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ... 21st USENIX Security Symposium (USENIX Security 12), 491-506, 2012 | 741 | 2012 |
Building a dynamic reputation system for {DNS} M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster 19th USENIX Security Symposium (USENIX Security 10), 2010 | 684 | 2010 |
Sok: Security evaluation of home-based iot deployments O Alrawi, C Lever, M Antonakakis, F Monrose 2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019 | 481 | 2019 |
Detecting malware domains at the upper {DNS} hierarchy M Antonakakis, R Perdisci, W Lee, N Vasiloglou II, D Dagon 20th USENIX Security Symposium (USENIX Security 11), 2011 | 424 | 2011 |
Method and system for detecting DGA-based malware M Antonakakis, R Perdisci, W Lee, IN Vasiloglou US Patent 9,922,190, 2018 | 311 | 2018 |
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose 2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019 | 193 | 2019 |
{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths T Nelms, R Perdisci, M Antonakakis, M Ahamad 24th USENIX Security Symposium (USENIX Security 15), 1025-1040, 2015 | 184* | 2015 |
Hiding in plain sight: A longitudinal study of combosquatting abuse P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 165 | 2017 |
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries D Dagon, M Antonakakis, P Vixie, T Jinmei, W Lee Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 156 | 2008 |
Method and system for determining whether domain names are legitimate or malicious M Antonakakis, R Perdisci, D Dagon, W Lee US Patent 9,516,058, 2016 | 142 | 2016 |
Method and system for detecting malicious domain names at an upper DNS hierarchy M Antonakakis, R Perdisci, W Lee, N Vasiloglou US Patent 8,631,489, 2014 | 140 | 2014 |
Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks B Rahbarinia, R Perdisci, M Antonakakis 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 131 | 2015 |
Method and system for detecting malware E Antonakakis, R Perdisci, W Lee, G Ollmann US Patent 8,578,497, 2013 | 117 | 2013 |
Outguard: Detecting in-browser covert cryptocurrency mining in the wild A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ... The World Wide Web Conference, 840-852, 2019 | 109 | 2019 |
A lustrum of malware network communication: Evolution and insights C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis 2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017 | 107 | 2017 |
Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis R Perdisci, T Papastergiou, O Alrawi, M Antonakakis 2020 IEEE european symposium on security and privacy (EuroS&P), 474-489, 2020 | 105 | 2020 |
Beheading hydras: performing effective botnet takedowns Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 102 | 2013 |
Practical attacks against graph-based clustering Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ... Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 99 | 2017 |
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis 2016 IEEE symposium on security and privacy (SP), 691-706, 2016 | 99 | 2016 |