Tudor Dumitras [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports SIEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns NDSS-2017 - california,usa
FeatureSmith: Learning to Detect Malware by Mining the Security Literature enigma-2017 - california,usa
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits SecuritySymposium-2015 - washington,USA
Don't Show Me Yours, I Won't Show You Mine: Security Research with Non-Public Data HotSec-2015 - washington,USA
Exploitation of vulnerabilities - if, when and how often (paper poster) Raid-2014 - gottenburg,sweden
Some Vulnerabilities Are Different Than Others: Studying Vulnerabilities and Attack Surfaces in the Wild Raid-2014 - gottenburg,sweden
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA Statistics Telemetry