Misleading worm signature generators using deliberate noise injection

R. Perdisci , D. Dagon , Wenke Lee , P. Fogla
ieee symposium on security and privacy 17 -31

283
2006
Detection of Intrusions and Malware, and Vulnerability Assessment

Roberto Perdisc , Iclémentine Maurice , Giorgio Giacinto , Magnus Almgren
LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 11543

1
2019
ExecScent: mining for new C&C domains in live networks with adaptive control protocol templates

Roberto Perdisci , Mustaque Ahamad , Terry Nelms
usenix security symposium 589 -604

73
2013
Building a dynamic reputation system for DNS

Roberto Perdisci , David Dagon , Manos Antonakakis , Nick Feamster
usenix security symposium 18 -18

630
2010
Notos: Building a Dynamic Reputation System for DNS

Roberto Perdisci , David Dagon , Manos Antonakakis , Nick Feamster

3
2010
From throw-away traffic to bots: detecting the rise of DGA-based malware

Roberto Perdisci , David Dagon , Yacin Nadji , Manos Antonakakis
usenix security symposium 24 -24

669
2012
BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection

Roberto Perdisci , Guofei Gu , Wenke Lee , Junjie Zhang
usenix security symposium 139 -154

1,591
2008
Behavioral clustering of HTTP-based malware and signature generation using malicious network traces

Roberto Perdisci , Nick Feamster , Wenke Lee
networked systems design and implementation 26 -26

500
2010
Polymorphic blending attacks

Roberto Perdisci , Prahlad Fogla , Oleg Kolesnikov , Wenke Lee
usenix security symposium 17

218
2006
WebWitness: investigating, categorizing, and mitigating malware download paths

Roberto Perdisci , Manos Antonakakis , Mustaque Ahamad , Terry Nelms
usenix security symposium 1025 -1040

48
2015
SinkMiner: Mining Botnet Sinkholes for Fun and Profit

Roberto Perdisci , David Dagon , Babak Rahbarinia , Manos Antonakakis
6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 13)

7
2013
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.

Roberto Perdisci , Edmond W. W. Chan , Xiapu Luo , Wenke Lee
network and distributed system security symposium

104
2011
Detecting malware domains at the upper DNS hierarchy

Roberto Perdisci , David Dagon , Manos Antonakakis , Nikolaos Vasiloglou
usenix security symposium 27 -27

232
2011
Dynamic IP Reputation from DNS

Manos Antonakakis , Roberto Perdisci , Wenke Lee , Georgia Institute of Technology Atlanta United States

2009
Detecting and Tracking the Rise of DGA-Based Malware.

Roberto Perdisci , Manos Antonakakis , Nikolaos Vasiloglou , Wenke Lee
;login:: the magazine of USENIX & SAGE 37 ( 6) 15 -24

1
2012
Exposing Invisible Timing-base dT raffic Watermarks with BACKLIT

Roberto Perdisci , Xiapu Luo , Wenke Lee , Rocky K. C. Chang

2011
Building a Collaborative Phone Blacklisting System with Local Differential Privacy.

Roberto Perdisci , Mustaque Ahamad , Daniele Ucci , Jaewoo Lee
arXiv: Cryptography and Security

1
2020
Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System

Roberto Perdisci , Wenke Lee , Yang Ji , Joey Allen
computer and communications security 787 -802

2020
C$^2$SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis

Roberto Perdisci , Yonghwi Kwon , Kyu Hyung Lee , Weihang Wang
network and distributed system security symposium

2021
Introduction to the ACSAC’19 Special Issue—Vol. 2

Roberto Perdisci , Gianluca Stringhini , Adam Doupé , Martina Lindorfer
Digital Threats: Research and Practice

2021