3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats 2010 April 28, 2010 to April 30, 2010, San Jose, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Keynote Address: Why Don'T I (Still) Trust Anything? Jeff ( Dark Tangent ) Moss None Security Keynote
Botnets Mike "mckt" Bailey None Security Botnets
Tumbling Down The Rabbit Hole: Exploring The Idiosyncrasies Of Botmaster Systems In A Multi-Tier Botnet Infrastructure Greg Sinclair , Chris Nunnery , Brent ByungHoon Kang None Security Infrastructure
Insights From The Inside: A View Of Botnet Management From Infiltration Dawn Song , Juan Caballero , Chris Grier , Chia Yuan Cho , Vern Paxson Security
Threat Measurement And Characterization Stefan Savage None Security
The Nocebo Effect On The Web: An Analysis Of Fake Anti-Virus Distribution Niels Provos , Lucas Ballard , Moheeb Abu Rajab , Panayiotis Mavrommatis , Xin Zhao None Security Analysis
Spying The World From Your Laptop: Identifying And Profiling Content Providers And Big Downloaders In Bittorrent Stevens Le Blond , Arnaud Legout , Fabrice Lefessant , Walid Dabbous , Mohamed Ali Kaafar None Security
Webcop: Locating Neighborhoods Of Malware On The Web Jack W. Stokes , Reid Andersen , Christian Seifert , Kumar Chellapilla None Security Web Malware
Naked Avatars And Other Cautionary Tales About Mmorpg Password Stealers Jeff Williams None Security
Threat Detection And Mitigation Yinglian Xie None Security
On The Potential Of Proactive Domain Blacklisting Vern Paxson , Christian Kreibich , Mark Felegyhazi None Security
Detection Of Spam Hosts And Spam Bots Using Network Flow Traffic Modeling Willa K. Ehrlich , Anestis Karasaridis , Danielle Liu , David Hoeflin None Security
Extending Black Domain Name List By Using Co-Occurrence Relation Between Dns Queries Kazumichi Sato , Keisuke Ishibashi , Tsuyoshi Toyono , Nobuhisa Miyake None Security DNS
New Threats And Challenges Vinod Yegneswaran None Security
Are Text-Only Data Formats Safe? Or, Use This Latex Class File To Pwn Your Computer Hovav Shacham , Eric Rescorla , Stephen Checkoway None Security
Dns Prefetching And Its Privacy Implications: When Good Things Go Bad Srinivas Krishnan , Fabian Monrose Security DNS Privacy