David Dagon

According to our database1, David Dagon authored at least 38 papers between 2004 and 2017.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains.
IEEE Secur. Priv., 2017

Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet.
Comput. Secur., 2017

Measuring Network Reputation in the Ad-Bidding Process.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Enabling Network Security Through Active DNS Datasets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Understanding the Privacy Implications of ECS - (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2014
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
SinkMiner: Mining Botnet Sinkholes for Fun and Profit.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Beheading hydras: performing effective botnet takedowns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Large-scale DNS data analysis.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Detecting Malware Domains at the Upper DNS Hierarchy.
Proceedings of the 20th USENIX Security Symposium, 2011

Impeding Individual User Profiling in Shopper Loyalty Programs.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Building a Dynamic Reputation System for DNS.
Proceedings of the 19th USENIX Security Symposium, 2010

A Centralized Monitoring Infrastructure for Improving DNS Security.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Recursive DNS Architectures and Vulnerability Implications.
Proceedings of the Network and Distributed System Security Symposium, 2009

Towards complete node enumeration in a peer-to-peer botnet.
Proceedings of the 2009 ACM Symposium on Information, 2009

Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Detecting Botnet Membership with DNSBL Counterintelligence.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

A Taxonomy of Botnet Structures.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
Proceedings of the Network and Distributed System Security Symposium, 2008

Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Peer-to-Peer Botnets: Overview and Case Study.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007

A Taxonomy of Botnet Structures.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Revealing Botnet Membership Using DNSBL Counter-Intelligence.
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006

MisleadingWorm Signature Generators Using Deliberate Noise Injection.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Modeling Botnet Propagation Using Time Zones.
Proceedings of the Network and Distributed System Security Symposium, 2006

Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

Can DNS-Based Blacklists Keep Up with Bots?
Proceedings of the CEAS 2006, 2006

Measuring intrusion detection capability: an information-theoretic approach.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Environment-Sensitive Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Protecting Secret Data from Insider Attacks.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
Mobile Phones as Computing Devices: The Viruses are Coming!
IEEE Pervasive Comput., 2004

HoneyStat: Local Worm Detection Using Honeypots.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Worm Detection, Early Warning and Response Based on Local Victim Information.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004


  Loading...