Main navigation | Main content
Main reading for March 24th:
Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett
Stone-Gross, Daniel Plohmann, Christian J. Dietrich, and Herbert
Bos. “SoK: P2PWNED — modeling and evaluating the
resilience of peer-to-peer botnets”. In IEEE Symposium on
Security and Privacy (“Oakland”), pages 97–111,
San Francisco, CA, USA, May 2013.
[IEEE]
Main reading for March 26th:
Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian
J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy,
Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique,
Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan
Savage, and Geoffrey M. Voelker. “Manufacturing compromise: the
emergence of exploit-as-a-service”. In ACM Conference on
Computer and Communications Security, pages 821–832,
Raleigh, NC, USA, November 2012.
[ACM]
Not selected:
Vacha Dave, Saikat Guha, and Yin Zhang. “ViceROI: Catching
click-spam in search ad networks”. In ACM Conference on
Computer and Communications Security, pages 765–776, Berlin,
Germany, November 2013.
[ACM]
Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, and Markus
Jakobsson. “Scambaiter: Understanding targeted Nigerian scams on
Craigslist”. In Network and Distributed Systems Security
Symposium (NDSS), San Diego, CA, USA, February 2014.
[Internet Society]