Title |
Conference |
Tags |
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software |
USENIX-2016 - austin,usa |
|
Trends and Lessons from Three Years Fighting Malicious Extensions |
SecuritySymposium-2015 - washington,USA |
|
Panel on Research Ethics |
SecuritySymposium-2015 - washington,USA |
|
A Safe Browsing view on the Evolution from Malware to Unwanted Software |
Raid-2014 - gottenburg,sweden |
|
Tick Tock: Building Browser Red Pills from Timing Side Channels |
Woot-2014 - san diego,usa |
|
Large-Scale Systems Security I |
USENIX-2013 - Washington, D.C. |
|
Botnets and Web Security |
USENIX-2012 - Washington, D.C. |
|
Detection Of Network Attacks |
19th USENIX Security Symposium-2010 - Washington DC, USA |
Security
|
The Nocebo Effect On The Web: An Analysis Of Fake Anti-Virus Distribution |
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA |
Security
Analysis
|
Malware Detection And Protection |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
Malware
|
All Your Iframes Point To Us |
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
|
To Catch A Predator: A Natural Language Approach For Eliciting Malicious Payloads |
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
|
Setting Dns'S Hair On Fire |
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
|
The Ghost In The Browser And Other Frightening Stories About Web Malware |
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
Web
Malware
Browser
|
Opening Remarks |
3rd USENIX Workshop on Hot Topics in Security-2008 - San Jose, USA |
Security
|
Attacker Behavior |
1st USENIX Workshop on Large-Scale Exploits and Emergent Threats-2008 - San Francisco, USA |
Security
|
Attacks |
15th USENIX Security Symposium-2006 - Vancouver, Canada |
Security
|
Panel National Id Cards |
14th USENIX Security Symposium-2005 - Baltimore, USA |
Security
Panel
|
Protecting The Network |
14th USENIX Security Symposium-2005 - Baltimore, USA |
Security
|
A Virtual Honeypot Framework |
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
|
Forensics And Response |
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
Forensics
|
Honeyd, Honeypots |
12th USENIX Security Symposium-2003 - Washington DC, USA |
Security
|
Preventing Privilege Escalation |
12th USENIX Security Symposium-2003 - Washington DC, USA |
Security
|
Improving Host Security With System Call Policies |
12th USENIX Security Symposium-2003 - Washington DC, USA |
Security
|
Defending Against Statistical Steganalysis |
10th USENIX Security Symposium-2001 - Washington DC, USA |
Cryptography
Security
|
Encrypting Virtual Memory |
9th USENIX Security Symposium-2000 - Denver, USA |
Security
|