Niels Provos

According to our database1, Niels Provos authored at least 38 papers between 1999 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2016
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Trends and Lessons from Three Years Fighting Malicious Extensions.
Proceedings of the 24th USENIX Security Symposium, 2015

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Tick Tock: Building Browser Red Pills from Timing Side Channels.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

2013
CAMP: Content-Agnostic Malware Protection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Manufacturing compromise: the emergence of exploit-as-a-service.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution.
;login:, 2010

Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing.
ACM Trans. Internet Techn., 2010

The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2009
Cybercrime 2.0: When the Cloud Turns Dark.
ACM Queue, 2009

Cybercrime 2.0: when the cloud turns dark.
Commun. ACM, 2009

2008
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
Proceedings of the 17th USENIX Security Symposium, 2008

All Your iFRAMEs Point to Us.
Proceedings of the 17th USENIX Security Symposium, 2008

Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
Proceedings of the Network and Distributed System Security Symposium, 2008

Peeking Through the Cloud: DNS-Based Estimation and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

Virtual Honeypots - From Botnet Tracking to Intrusion Detection.
Addison-Wesley, ISBN: 978-0-321-33632-3, 2008

2007
The Ghost in the Browser: Analysis of Web-based Malware.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007

2006
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol.
RFC, March, 2006

Search worms.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection.
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006

Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

2005
Firewall.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
A Virtual Honeypot Framework.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

2003
Hide and Seek: An Introduction to Steganography.
IEEE Security & Privacy, 2003

Preventing Privilege Escalation.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Improving Host Security with System Call Policies.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

2002
Detecting Steganographic Content on the Internet.
Proceedings of the Network and Distributed System Security Symposium, 2002

2001
Defending Against Statistical Steganalysis.
Proceedings of the 10th USENIX Security Symposium, 2001

ScanSSH: Scanning the Internet for SSH Servers.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001

2000
The Use of HMAC-RIPEMD-160-96 within ESP and AH.
RFC, June, 2000

Encrypting Virtual Memory.
Proceedings of the 9th USENIX Security Symposium, 2000

Scalable Network I/O in Linux.
Proceedings of the Freenix Track: 2000 USENIX Annual Technical Conference, 2000

Analyzing the Overload Behavior of a Simple Web Server.
Proceedings of the 4th Annual Linux Showcase & Conference 2000, 2000

1999
Cryptography in OpenBSD: An Overview.
Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference, 1999

A Future-Adaptable Password Scheme.
Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference, 1999


  Loading...