A Lustrum of Malware Network Communication: Evolution and Insights |
BlueHat v17
|
28 Registrations Later: Measuring the Exploitation of Residual Trust in Domains |
BlueHat v17
|
Checking Open-Source License Violation and 1-day Security Risk at Large Scale |
ACM CCS 2017
|
Designing New Operating Primitives to Improve Fuzzing Performance |
ACM CCS 2017
|
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse |
ACM CCS 2017
|
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware |
ACM CCS 2017
|
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection |
ACM CCS 2017
|
Practical Attacks Against Graph-based Clustering |
ACM CCS 2017
|
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking |
ACM CCS 2017
|
AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically |
Black Hat USA 2017
|