Sciweavers

NSDI
2008
14 years 1 months ago
On the Spam Campaign Trail
Christian Kreibich, Chris Kanich, Kirill Levchenko...
NSDI
2008
14 years 1 months ago
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff
In this paper we highlight a number of challenges that arise in using crawling to measure the size, topology, and dynamism of distributed botnets. These challenges include traffic...
Chris Kanich, Kirill Levchenko, Brandon Enright, G...
NSDI
2008
14 years 1 months ago
Characterizing Botnets from Email Spam Records
We develop new techniques to map botnet membership using traces of spam email. To group bots into botnets we look for multiple bots participating in the same spam email campaign. ...
Li Zhuang, John Dunagan, Daniel R. Simon, Helen J....
NSDI
2008
14 years 1 months ago
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware
While the web provides information and services that enrich our lives in many ways, it has also become the primary vehicle for delivering malware. Once infected with web-based mal...
Michalis Polychronakis, Niels Provos
NSDI
2008
14 years 1 months ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...
NSDI
2008
14 years 1 months ago
Maelstrom: Transparent Error Correction for Lambda Networks
The global network of datacenters is emerging as an important distributed systems paradigm -- commodity clusters running high-performance applications, connected by high-speed `la...
Mahesh Balakrishnan, Tudor Marian, Ken Birman, Hak...
NSDI
2008
14 years 1 months ago
Behind Phishing: An Examination of Phisher Modi Operandi
Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine ...
D. Kevin McGrath, Minaxi Gupta
NSDI
2008
14 years 1 months ago
Detecting In-Flight Page Changes with Web Tripwires
While web pages sent over HTTP have no integrity guarantees, it is commonly assumed that such pages are not modified in transit. In this paper, we provide evidence of surprisingly...
Charles Reis, Steven D. Gribble, Tadayoshi Kohno, ...
NSDI
2008
14 years 1 months ago
DieCast: Testing Distributed Systems with an Accurate Scale Model
Large-scale network services can consist of tens of thousands of machines running thousands of unique software configurations spread across hundreds of physical networks. Testing ...
Diwaker Gupta, Kashi Venkatesh Vishwanath, Amin Va...
NSDI
2008
14 years 1 months ago
Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures
The paper presents and evaluates Nysiad,1 a system that implements a new technique for transforming a scalable distributed system or network protocol tolerant only of crash failur...
Chi Ho, Robbert van Renesse, Mark Bickford, Danny ...