Topics · Papers
Malware
Practical Attacks Against Graph-based ClusteringYizheng Chen (Georgia Institute of Technology), Yacin Nadji (Georgia Institute of Technology), Athanasios Kountouras (Georgia Institute of Technology), Fabian Monrose (University of North Carolina at Chapel Hill), Roberto Perdisci (University of Georgia), Manos Antonakakis (Georgia Institute of Technology), Nikolaos Vasiloglou (Symantec)
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity DetectionXiaojun Xu (Shanghai Jiao Tong University), Chang Liu (University of California, Berkeley), Qian Feng (Samsung Research America), Heng Yin (University of California, Riverside), Le Song (Georgia Institute of Technology), Dawn Song (University of California, Berkeley)
Data breaches, phishing, or malware? Understanding the risks of stolen credentialsKurt Thomas (Google), Frank Li (University of California, Berkeley), Ali Zand (Google), Jake Barrett (Google), Juri Ranieri (Google), Luca Invernizzi (Google), Yarik Markov (Google), Oxana Comanescu (Google), Vijay Eranti (Google), Angelika Moscicki (Google), Dan Margolis (Google), Vern Paxson (University of California, Berkeley), Elie Bursztein (Google)
Capturing Malware Propagations with Code Injections and Code-Reuse attacksDavid Korczynski (University of Oxford), Heng Yin (University of California, Riverside)
Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKIDoowon Kim (University of Maryland), Bum Jun Kwon (University of Maryland), Tudor Dumitraş (University of Maryland)
Hiding in Plain Sight: A Longitudinal Study of Combosquatting AbusePanagiotis Kintis (Georgia Institute of Technology), Najmeh Miramirkhani (Stony Brook University), Charles Lever (Georgia Institute of Technology), Yizheng Chen (Georgia Institute of Technology), Rosa Romero-Gómez (Georgia Institute of Technology), Nikolaos Pitropakis (London South Bank University), Nick Nikiforakis (Stony Brook University), Manos Antonakakis (Georgia Institute of Technology)
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic ExecutionGrant Hernandez (University of Florida), Farhaan Fowze (University of Florida), Dave (Jing) Tian (University of Florida), Tuba Yavuz (University of Florida), Kevin Butler (University of Florida)
POISED: Spotting Twitter Spam Off the Beaten PathsShirin Nilizadeh (University of California, Santa Barbara), François Labrèche (École Polytechnique de Montréal), Alireza Sadighian (École Polytechnique de Montréal), Ali Zand (University of California, Santa Barbara), José Fernandez (École Polytechnique de Montréal), Christopher Kruegel (University of California, Santa Barbara), Gianluca Stringhini (University College London), Giovanni Vigna (University of California, Santa Barbara)
IMF: Inferred Model-based FuzzerHyungSeok Han (KAIST), Sang Kil Cha (KAIST)