Center for Cyber Operations Enquiry and Unconventional Sensing (COEUS)

Practical Attacks Against DNS Reputation Systems

Tillson Galloway, Kleanthis Karakolios, Zane Ma, Roberto Perdisci, Angelos Keromytis, Manos Antonakakis

IEEE Symposium on Security and Privacy, 2024

More pdf cite

Harnessing the Power of General-Purpose LLMs in Hardware Trojan Design

Georgios Kokolakis, Athanasios Moschos, Angelos D Keromytis

Artificial Intelligence in Hardware Security Workshop - Applied Cryptography and Network Security, 2024

More pdf

Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans

Athanasios Moschos, Fabian Monrose, Angelos D Keromytis

IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2024

More pdf IEEE arXiv github

Considering the Future of Hardware Trojan Attacks

Athanasios Moschos, Angelos D. Keromytis, Georgia Institute of Technology

60th Design Automation Conference (DAC), 2023

pdf

Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators

Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, and Charles Lever, Georgia Institute of Technology; Paul Burbage, MalBeacon; Angelos D. Keromytis, Fabian Monrose, and Manos Antonakakis, Georgia Institute of Technology

32nd USENIX Security Symposium, 2023

More pdf cite

The Design and Implementation of an Open-Source Hardware Trojan for a 64-bit RISC-V CPU

Athanasios Moschos; Angelos D. Keromytis

Poster Section - IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022

More pdf slides github

Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection

Priyanka Dodia; Mashael AlSabah; Omar Alrawi; Tao Wang

Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2022

More pdf cite

On the Feasibility of Remotely Triggered Automotive Hardware Trojans

Athanasios Moschos, Kevin Valakuzhy, Angelos D. Keromytis

IEEE International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 2022

More pdf proceedings cite

The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle

Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Snow, Fabian Monrose, Manos Antonakakis

30th USENIX Security Symposium, 2021

More pdf slides cite

Understanding the Growth and Security Considerations of ECS

Athanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, Chaz Lever, Michalis Polychronakis, Manos Antonakakis

Network and Distributed Systems Security (NDSS) Symposium 2021

More pdf slides

IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis

Roberto Perdisci, Thomas Papastergiou, Omar Alrawi, Manos Antonakakis

IEEE European Symposium on Security and Privacy, 2020

More pdf cite

SoK: Security Evaluation of Home-Based IoT Deployments

Omar Alrawi, Chaz Lever, Manos Antonakakis, Fabian Monrose

IEEE Symposium on Security and Privacy, 2019

More pdf

Towards Designing Effective Visualizations for DNS-based Network Threat Analysis

Rosa Romero-Gomez, Yacin Nadji, Manos Antonakakis

IEEE Symposium on Visualization for Cyber Security, 2017

More pdf cite

Practical Attacks Against Graph-based Clustering

Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou

ACM SIGSAC conference on Computer & communications security, 2017

More pdf

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Roza Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis

ACM SIGSAC conference on Computer & communications security, 2017

More pdf

Understanding the Mirai Botnet

Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou

26th USENIX Security Symposium, 2017

More pdf cite

Measuring Network Reputation in the Ad-Bidding Process

Yizheng Chen, Yacin Nadji, Rosa Romero-Gomez, Manos Antonakakis, and David Dagon

14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2017

More pdf

A Lustrum of Malware Network Communication: Evolution and Insights

Charles Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis

38th IEEE Symposium on Security and Privacy (Oakland), 2017

More pdf

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution

Bharat Srinivasan, Payas Gupta, Manos Antonakakis and Mustaque Ahamad

21st European Symposium on Research in Computer Security (ESORICS), 2016

More pdf

Enabling Network Security Through Active DNS Datasets

Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon, Manos Antonakakis, and Rodney Joffe

19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2016

More pdf cite data

Towards Measuring and Mitigating Social Engineering Malware Download Attacks

Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad

25th USENIX Security Symposium, 2016

More pdf cite

Understanding the Privacy Implications of ECS

Panagiotis Kintis, Yacin Nadji, David Dagon, Michael Farrell and Manos Antonakakis

13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)

More pdf cite

Financial Lower Bounds of Online Advertising Abuse

Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee and Michael Farrell

13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)

More pdf cite data

Domain-Z: 28 Registrations Later—Measuring the Exploitation of Residual Trust in Domains

Charles Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick McDaniel, Manos Antonakakis

IEEE Symposium on Security and Privacy (Oakland), 2016.

More pdf

WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths

Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad

USENIX Security Symposium, 2015.

More pdf

DNS Noise - Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic

Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee

Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference

More pdf

Beheading Hydras - Performing Effective Botnet Takedowns

Yacin Nadji, Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee

Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security

More pdf cite

Connected colors: Unveiling the structure of criminal networks

Yacin Nadji, Manos Antonakakis, Roberto Perdisci, and Wenke Lee

16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013)

More pdf cite

The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers

Charles Lever, Manos Antonakakis, Brad Reaves, Patrick Traynor, Wenke Lee

20th Annual Network & Distributed System Security Symposium (NDSS), 2013

More pdf slides cite

From Throw-Away Traffic to Bots - Detecting the Rise of DGA-Based Malware.

Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou II, Saeed Abu-Nimeh, Wenke Lee, David Dagon

USENIX security symposium

More pdf slides cite

Understanding the Prevalence and Use of Alternative Plans in Malware with Network Games

Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee

The 27th Annual Computer Security Conference (ACSAC 2011)

More pdf slides cite

Detecting Malware Domains at the Upper DNS Hierarchy

Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon

USENIX Security Symposium

More pdf slides cite

A centralized monitoring infrastructure for improving dns security

Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor

Recent Advances in Intrusion Detection, 2010

More pdf cite

Building a Dynamic Reputation System for DNS.

Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster

USENIX security symposium

More pdf slides cite

Recursive DNS Architectures and Vulnerability Implications

David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P Lee, Wenke Lee

NDSS

More pdf

Increased DNS Forgery Resistance Through 0x20-Bit Encoding

David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee

Proceedings of the 15th ACM conference on Computer and Communications Security

More pdf cite