Measurement and analysis of Hajime, a peer-to-peer IoT botnet
The Internet of Things (IoT) introduces an unprece-dented diversity and ubiquity to
networked computing. It also introduces new attack surfaces that are a boon to attackers …
networked computing. It also introduces new attack surfaces that are a boon to attackers …
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
A comprehensive study of email spam botnet detection
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
Weaving tangled webs: offense, defense, and deception in cyberspace
It is widely believed that cyberspace is offense dominant because of technical characteristics
that undermine deterrence and defense. This argument mistakes the ease of deception on …
that undermine deterrence and defense. This argument mistakes the ease of deception on …
Measuring {Pay-per-Install}: The commoditization of malware distribution
Recent years have seen extensive diversification of the “underground economy” associated
with malware and the subversion of Internet-connected systems. This trend towards …
with malware and the subversion of Internet-connected systems. This trend towards …
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
Distributed Denial of Service (DDoS) attack is a critical threat to the Internet, and botnets are
usually the engines behind them. Sophisticated botmasters attempt to disable detectors by …
usually the engines behind them. Sophisticated botmasters attempt to disable detectors by …
Manufacturing compromise: the emergence of exploit-as-a-service
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …
Inference and analysis of formal models of botnet command and control protocols
We propose a novel approach to infer protocol state machines in the realistic high-latency
network setting, and apply it to the analysis of botnet Command and Control (C &C) …
network setting, and apply it to the analysis of botnet Command and Control (C &C) …
[PDF][PDF] The Underground Economy of Spam: A Botmaster's Perspective of Coordinating {Large-Scale} Spam Campaigns
Spam accounts for a large portion of the email exchange on the Internet. In addition to being
a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many …
a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many …
Ad injection at scale: Assessing deceptive advertisement modifications
Today, web injection manifests in many forms, but fundamentally occurs when malicious and
unwanted actors tamper directly with browser sessions for their own profit. In this work we …
unwanted actors tamper directly with browser sessions for their own profit. In this work we …