International Computer Science Institute (ICSI)

General Info

Rank: #37 Worldwide
#26 in US
Papers: 72
Number of Researchers: 27
APA
(average papers per authors):
2.7
Country: USA

Activity Map

Contributors

  • Vern Paxson (44 papers)
  • Nicholas Weaver (12 papers)
  • Christian Kreibich (9 papers)
  • Chris Grier (9 papers)
  • Narseo Vallina-Rodriguez (6 papers)
  • Robin Sommer (5 papers)
  • Michael Carl Tschantz (4 papers)
  • Serge Egelman (4 papers)
  • Johanna Amann (3 papers)
  • Mark Allman (2 papers)
  • Damon McCoy (2 papers)
  • Jianjun Chen (2 papers)
  • Sadia Afroz (2 papers)
  • Alisa Frik (2 papers)
  • Nick Weaver (2 papers)
  • Srikanth Sundaresan (1 papers)
  • Zakir Durumeric (1 papers)
  • Ryan Rasti (1 papers)
  • Feargus Pendlebury (1 papers)
  • Jose Maria Gonzalez (1 papers)
  • Stefan Savage (1 papers)
  • Paul Pearce (1 papers)
  • Mark Handley (1 papers)
  • Primal Wijesekera (1 papers)
  • Sumayah Alrwais (1 papers)
  • Joshua Reynolds (1 papers)
  • Nikita Samarin (1 papers)

Papers

"Detecting Backdoors"

Vern Paxson, ... -- Usenix 2000

"Detecting Stepping Stones"

Vern Paxson, ... -- Usenix 2000

"Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics"

Mark Handley, Vern Paxson, ... -- Usenix 2001

"How to Own the Internet in Your Spare Time"

Vern Paxson, ... -- Usenix 2002

"Active Mapping: Resisting NIDS Evasion Without Altering Traffic"

Vern Paxson, ... -- Oakland 2003

"Enhancing byte-level network intrusion detection signatures with context"

Vern Paxson, ... -- CCS 2003

"Fast Portscan Detection Using Sequential Hypothesis Testing"

Vern Paxson, ... -- Oakland 2004

"Operational Experiences with High-Volume Network Intrusion Detection"

Vern Paxson, ... -- CCS 2004

"Very Fast Containment of Scanning Worms"

Nicholas Weaver, Vern Paxson, ... -- Usenix 2004

"Robust TCP Stream Reassembly in the Presence of Adversaries"

Vern Paxson, ... -- Usenix 2005

"Protocol-Independent Adaptive Replay of Application Dialog"

Vern Paxson, Nicholas Weaver, ... -- NDSS 2006

"Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection"

Vern Paxson, Robin Sommer, ... -- Usenix 2006

"Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention"

Jose Maria Gonzalez, Vern Paxson, Nicholas Weaver, ... -- CCS 2007

"An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants"

Vern Paxson, Stefan Savage, ... -- CCS 2007

"Efficient and Robust TCP Stream Normalization"

Vern Paxson, ... -- Oakland 2008

"Spamalytics: An Empirical Analysis of Spam Marketing Conversion"

Christian Kreibich, Vern Paxson, ... -- CCS 2008

"Detecting Forged TCP Reset Packets"

Nicholas Weaver, Robin Sommer, Vern Paxson, ... -- NDSS 2009

"Botnet Judo: Fighting Spam with Itself"

Christian Kreibich, Vern Paxson, Nicholas Weaver, ... -- NDSS 2010

"Outside the Closed World: On Using Machine Learning For Network Intrusion Detection"

Robin Sommer, Vern Paxson, ... -- Oakland 2010

"Click Trajectories: End-to-End Analysis of the Spam Value Chain"

Chris Grier, Christian Kreibich, Nicholas Weaver, Vern Paxson, ... -- Oakland 2011

"Measuring Pay-per-Install: The Commoditization of Malware Distribution"

Chris Grier, Christian Kreibich, Vern Paxson, ... -- Usenix 2011

"Show Me the Money: Characterizing Spam-advertised Revenue"

Nicholas Weaver, Christian Kreibich, Vern Paxson, ... -- Usenix 2011

"[SoK] Prudent Practices for Designing Malware Experiments: Status Quo and Outlook"

Chris Grier, Christian Kreibich, Vern Paxson, ... -- Oakland 2012

"Priceless: The Role of Payments in Abuse-advertised Goods"

Christian Kreibich, ... -- CCS 2012

"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs"

Nicholas Weaver, Christian Kreibich, ... -- Usenix 2012

"Detecting Stealthy, Distributed SSH Bruteforcing"

Vern Paxson, ... -- CCS 2013

"Practical Comprehensive Bounds on Surreptitious Communication over DNS"

Vern Paxson, Nicholas Weaver, ... -- Usenix 2013

"Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse"

Chris Grier, Vern Paxson, ... -- Usenix 2013

"Botcoin: Monetizing Stolen Cycles"

Chris Grier, Nicholas Weaver, ... -- NDSS 2014

"Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors"

Serge Egelman, ... -- CCS 2014

"Consequences of Connectivity: Characterizing Account Hijacking on Twitter"

Chris Grier, Vern Paxson, ... -- CCS 2014

"Dialing Back Abuse on Phone Verified Accounts"

Chris Grier, ... -- CCS 2014

"Characterizing Large-Scale Click Fraud in ZeroAccess"

Paul Pearce, Chris Grier, Vern Paxson, ... -- CCS 2014

"Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection"

Robin Sommer, ... -- CCS 2014

"When Governments Hack Opponents: A Look at Actors and Technology"

Vern Paxson, ... -- Usenix 2014

"Hulk: Eliciting Malicious Behavior in Browser Extensions"

Chris Grier, Vern Paxson, ... -- Usenix 2014

"Ad Injection at Scale: Assessing Deceptive Advertisement Modifications"

Vern Paxson, ... -- Oakland 2015

"Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks"

Ryan Rasti, Nicholas Weaver, Vern Paxson, ... -- Oakland 2015

"Cookies Lack Integrity: Real-World Implications"

Nick Weaver, ... -- Usenix 2015

"TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication"

Johanna Amann, ... -- NDSS 2016

"Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy"

Mark Allman, ... -- NDSS 2016

"Forwarding-Loop Attacks in Content Delivery Networks"

Vern Paxson, ... -- NDSS 2016

"Do You See What I See? Differential Treatment of Anonymous Users"

Srikanth Sundaresan, Damon McCoy, Vern Paxson, ... -- NDSS 2016

"SoK: Towards Grounding Censorship Circumvention in Empiricism"

Michael Carl Tschantz, Sadia Afroz, Vern Paxson, ... -- Oakland 2016

"PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration"

Vern Paxson, ... -- CCS 2016

"Host of Troubles: Multiple Host Ambiguities in HTTP Implementations"

Nicholas Weaver, Vern Paxson, ... -- CCS 2016

"Specification Mining for Intrusion Detection in Networked Control Systems"

Johanna Amann, Robin Sommer, ... -- Usenix 2016

"Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software"

Damon McCoy, ... -- Usenix 2016

"The Security Impact of HTTPS Interception"

Zakir Durumeric, Vern Paxson, ... -- NDSS 2017

"Global Measurement of DNS Censorship"

Nick Weaver, ... -- Usenix 2017

"Characterizing the Nature and Dynamics of Tor Exit Blocking"

Sadia Afroz, Michael Carl Tschantz, Vern Paxson, ... -- Usenix 2017

"Detecting Credential Spearphishing in Enterprise Settings"

Vern Paxson, ... -- Usenix 2017

"Assessing User Perceptions of Online Targeted Advertising"

Michael Carl Tschantz, ... -- Usenix 2017

"Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions."

Narseo Vallina-Rodriguez, ... -- NDSS 2018

"Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem."

Narseo Vallina-Rodriguez, Mark Allman, Christian Kreibich, ... -- NDSS 2018

"We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS"

Vern Paxson, ... -- Usenix 2018

"50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions Systems"

Primal Wijesekera, Narseo Vallina-Rodriguez, Serge Egelman, ... -- Usenix 2019

"Detecting and Characterizing Lateral Phishing at Scale"

Vern Paxson, ... -- Usenix 2019

"Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting"

Sumayah Alrwais, ... -- Usenix 2019

"CDN Judo: Breaking the CDN DoS Protection with Itself"

Jianjun Chen, ... -- NDSS 2020

"An Analysis of Pre-installed Android Software"

Narseo Vallina-Rodriguez, ... -- Oakland 2020

"SoK: Differential Privacy as a Causal Property"

Michael Carl Tschantz, ... -- Oakland 2020

"The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures"

Johanna Amann, ... -- CCS 2020

"Empirical Measurement of Systemic 2FA Usability"

Joshua Reynolds, Nikita Samarin, Serge Egelman, ... -- Usenix 2020

"The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment"

Alisa Frik, ... -- Usenix 2020

"Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck"

Serge Egelman, ... -- Usenix 2020

"Composition Kills: A Case Study of Email Sender Authentication"

Jianjun Chen, Vern Paxson, ... -- Usenix 2020

"Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem"

Narseo Vallina-Rodriguez, ... -- Oakland 2021

"Hopper: Modeling and Detecting Lateral Movement"

Vern Paxson, ... -- Usenix 2021

"Blind In/On-Path Attacks and Applications to VPNs"

Narseo Vallina-Rodriguez, ... -- Usenix 2021

"Deployment of Source Address Validation by Network Operators: A Randomized Control Trial"

Alisa Frik, ... -- Oakland 2022

"Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift"

Feargus Pendlebury, ... -- Oakland 2022