Sciweavers

NSDI
2008
13 years 9 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
NSDI
2008
13 years 9 months ago
IRBs and Security Research: Myths, Facts and Mission Creep
Having decided to focus attention on the "weak link" of human fallibility, a growing number of security researchers are discovering the US Government's regulations ...
Simson L. Garfinkel
NSDI
2008
13 years 9 months ago
Catching Instant Messaging Worms with Change-Point Detection Techniques
Instant messaging (IM) systems have gained a lot of popularity in recent years. The increasing number of IM users has lured malware authors to develop more worms and viruses that ...
Guanhua Yan, Zhen Xiao, Stephan Eidenbenz
NSDI
2008
13 years 9 months ago
Peeking into Spammer Behavior from a Unique Vantage Point
Understanding the spammer behavior is a critical step in the long-lasting battle against email spams. Previous studies have focused on setting up honeypots or email sinkholes cont...
Abhinav Pathak, Y. Charlie Hu, Zhuoqing Morley Mao
NSDI
2008
13 years 9 months ago
On the Spam Campaign Trail
Christian Kreibich, Chris Kanich, Kirill Levchenko...
NSDI
2008
13 years 9 months ago
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff
In this paper we highlight a number of challenges that arise in using crawling to measure the size, topology, and dynamism of distributed botnets. These challenges include traffic...
Chris Kanich, Kirill Levchenko, Brandon Enright, G...
NSDI
2008
13 years 9 months ago
Characterizing Botnets from Email Spam Records
We develop new techniques to map botnet membership using traces of spam email. To group bots into botnets we look for multiple bots participating in the same spam email campaign. ...
Li Zhuang, John Dunagan, Daniel R. Simon, Helen J....
NSDI
2008
13 years 9 months ago
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware
While the web provides information and services that enrich our lives in many ways, it has also become the primary vehicle for delivering malware. Once infected with web-based mal...
Michalis Polychronakis, Niels Provos
NSDI
2008
13 years 9 months ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...
NSDI
2008
13 years 9 months ago
Maelstrom: Transparent Error Correction for Lambda Networks
The global network of datacenters is emerging as an important distributed systems paradigm -- commodity clusters running high-performance applications, connected by high-speed `la...
Mahesh Balakrishnan, Tudor Marian, Ken Birman, Hak...