Your botnet is my botnet: analysis of a botnet takeover B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ... Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 995 | 2009 |
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ... 2013 IEEE symposium on security and privacy, 97-111, 2013 | 244 | 2013 |
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating {Large-Scale} Spam Campaigns B Stone-Gross, T Holz, G Stringhini, G Vigna 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011 | 244 | 2011 |
The underground economy of fake antivirus software B Stone-Gross, R Abman, RA Kemmerer, C Kruegel, DG Steigerwald, ... Economics of information security and privacy III, 55-78, 2013 | 178 | 2013 |
Understanding fraudulent activities in online ad exchanges B Stone-Gross, R Stevens, A Zarras, R Kemmerer, C Kruegel, G Vigna Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 176 | 2011 |
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos 2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013 | 168 | 2013 |
Fire: Finding rogue networks B Stone-Gross, C Kruegel, K Almeroth, A Moser, E Kirda 2009 Annual Computer Security Applications Conference, 231-240, 2009 | 146 | 2009 |
Analysis of a botnet takeover B Stone-Gross, M Cova, B Gilbert, R Kemmerer, C Kruegel, G Vigna IEEE Security & Privacy 9 (1), 64-72, 2010 | 128 | 2010 |
Two years of short urls internet measurement: security threats and countermeasures F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ... proceedings of the 22nd international conference on World Wide Web, 861-872, 2013 | 89 | 2013 |
{BOTMAGNIFIER}: Locating Spambots on the Internet G Stringhini, T Holz, B Stone-Gross, C Kruegel, G Vigna 20th USENIX Security Symposium (USENIX Security 11), 2011 | 69 | 2011 |
MIST: Cellular data network measurement for mobile applications MP Wittie, B Stone-Gross, KC Almeroth, EM Belding 2007 Fourth International Conference on Broadband Communications, Networks …, 2007 | 39 | 2007 |
Peering through the iframe B Stone-Gross, M Cova, C Kruegel, G Vigna 2011 Proceedings IEEE INFOCOM, 411-415, 2011 | 36 | 2011 |
The lifecycle of peer-to-peer (gameover) zeus B Stone-Gross Tech. rep., Dell Secure Works, 2012 | 17 | 2012 |
Malware in IEEE 802.11 wireless networks B Stone-Gross, C Wilson, K Almeroth, E Belding, H Zheng, ... Passive and Active Network Measurement: 9th International Conference, PAM …, 2008 | 17 | 2008 |
VeriKey: A dynamic certificate verification system for public key exchanges B Stone-Gross, D Sigal, R Cohn, J Morse, K Almeroth, C Kruegel Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008 | 8 | 2008 |
Malware analysis of the lurk downloader B Stone-Gross Retrieved February 13, 2016, 2014 | 7 | 2014 |
The underground economy of fake antivirus software D Steigerwald, G Vigna, C Kruegel, R Kemmerer, R Abman, ... | 2 | 2011 |
Your botnet is my botnet B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ... Proceedings of the 16th ACM conference on Computer and communications …, 0 | 2 | |
Measures to understand and thwart organized cybercrime B Stone-Gross University of California at Santa Barbara, 2011 | 1 | 2011 |
A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns B Stone-Gross, T Holz, G Stringhini, G Vigna GSWC 2011, 29, 2011 | | 2011 |