Roberto Perdisci

According to our database1, Roberto Perdisci authored at least 76 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SENet: Visual Detection of Online Social Engineering Attack Campaigns.
CoRR, 2024

2023
Measuring CDNs susceptible to Domain Fronting.
CoRR, 2023

TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Combating Robocalls with Phone Virtual Assistant Mediated Interaction.
Proceedings of the 32nd USENIX Security Symposium, 2023

Understanding, Measuring, and Detecting Modern Technical Support Scams.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
PhishInPatterns: measuring elicited user interactions at scale on phishing websites.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Returning to Port: Efficient Detection of Home Router Devices.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Categorizing Service Worker Attacks and Mitigations.
CoRR, 2021

Applying Deep Learning to Combat Mass Robocalls.
Proceedings of the IEEE Security and Privacy Workshops, 2021

C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

2020
Fighting Voice Spam with a Virtual Assistant Prototype.
CoRR, 2020

IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points.
CoRR, 2020

Building a Collaborative Phone Blacklisting System with Local Differential Privacy.
CoRR, 2020

Measuring Abuse in Web Push Advertising.
CoRR, 2020

When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Towards a Practical Differentially Private Collaborative Phone Blacklisting System.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns.
Proceedings of the Internet Measurement Conference, 2019

2018
Towards Measuring the Effectiveness of Telephony Blacklists.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Still Beheading Hydras: Botnet Takedowns Then and Now.
IEEE Trans. Dependable Secur. Comput., 2017

Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Exploring the Long Tail of (Malicious) Software Downloads.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Practical Attacks Against Graph-based Clustering.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
ACM Trans. Priv. Secur., 2016

Towards Measuring and Mitigating Social Engineering Software Download Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Understanding Malvertising Through Ad-Injecting Browser Extensions.
Proceedings of the 24th International Conference on World Wide Web, 2015

WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths.
Proceedings of the 24th USENIX Security Symposium, 2015

ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Building a Scalable System for Stealthy P2P-Botnet Detection.
IEEE Trans. Inf. Forensics Secur., 2014

PeerRush: Mining for unwanted P2P traffic.
J. Inf. Secur. Appl., 2014

DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Scalable fine-grained behavioral clustering of HTTP-based malware.
Comput. Networks, 2013

ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Connected Colors: Unveiling the Structure of Criminal Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

SinkMiner: Mining Botnet Sinkholes for Fun and Profit.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Measuring and Detecting Malware Downloads in Live Network Traffic.
Proceedings of the Computer Security - ESORICS 2013, 2013

Beheading hydras: performing effective botnet takedowns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Detecting and Tracking the Rise of DGA-Based Malware.
login Usenix Mag., 2012

Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis.
IEEE Trans. Dependable Secur. Comput., 2012

From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

VAMO: towards a fully automated malware clustering validity analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Detecting Malware Domains at the Upper DNS Hierarchy.
Proceedings of the 20th USENIX Security Symposium, 2011

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Proceedings of the Network and Distributed System Security Symposium, 2011

Detecting stealthy P2P botnets using statistical traffic fingerprints.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Boosting the scalability of botnet detection using adaptive traffic sampling.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

SURF: detecting and measuring search poisoning.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Understanding the prevalence and use of alternative plans in malware with network games.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Exposing invisible timing-based traffic watermarks with BACKLIT.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Building a Dynamic Reputation System for DNS.
Proceedings of the 19th USENIX Security Symposium, 2010

A Centralized Monitoring Infrastructure for Improving DNS Security.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

On the Secrecy of Spread-Spectrum Flow Watermarks.
Proceedings of the Computer Security, 2010

2009
McPAD: A multiple classifier system for accurate payload-based anomaly detection.
Comput. Networks, 2009

WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Classification of packed executables for accurate computer virus detection.
Pattern Recognit. Lett., 2008

Intrusion detection in computer networks by a modular ensemble of one-class classifiers.
Inf. Fusion, 2008

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008

McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Sensing Attacks in Computers Networks with Hidden Markov Models.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

2006
Alarm clustering for intrusion detection systems in computer networks.
Eng. Appl. Artif. Intell., 2006

Polymorphic Blending Attacks.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

MisleadingWorm Signature Generators Using Deliberate Noise Injection.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2005
Network Intrusion Detection by Combining One-Class Classifiers.
Proceedings of the Image Analysis and Processing, 2005


  Loading...