Follow
Chaz Lever
Title
Cited by
Cited by
Year
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017
17862017
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019
3282019
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1332017
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
20th Annual Network & Distributed System Security Symposium, 2013
962013
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
932017
Domain-Z: 28 Registration Later - Measuring the Exploitation of Residual Trust in Domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
852016
Enabling Network Security Through Active DNS Datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 2016
782016
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
712019
Whitewash: Outsourcing garbled circuit generation for mobile devices
H Carter, C Lever, P Traynor
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
582014
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle.
O Alrawi, C Lever, K Valakuzhy, Ryan Court, KZ Snow, F Monrose, ...
USENIX Security Symposium, 3505-3522, 2021
362021
Graph mining of motif profiles for computer network activity inference
W Turkett, E Fulp, C Lever, JE Allan
Ninth Workshop on Mining and Learning with Graphs, 2011
112011
Security in Plain TXT: Observing the Use of DNS TXT Records in the Wild
A Portier, H Carter, C Lever
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
72019
Understanding the Growth and Security Considerations of ECS.
A Kountouras, P Kintis, A Avgetidis, T Papastergiou, C Lever, ...
NDSS, 2021
32021
Dawn of the dead domain: Measuring the exploitation of residual trust in domains
C Lever, RJ Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
IEEE Security & Privacy 15 (2), 70-77, 2017
32017
Beyond the gates: An empirical analysis of HTTP-managed password stealers and operators
A Avgetidis, O Alrawi, K Valakuzhy, C Lever, P Burbage, A Keromytis, ...
32nd USENIX Security Symposium (USENIX Security 23), 2023
22023
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy
A Faulkenberry, A Avgetidis, Z Ma, O Alrawi, C Lever, P Kintis, F Monrose, ...
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
2022
Empirical analysis of existing and emerging threats at scale using DNS
CC Lever
Georgia Institute of Technology, 2018
2018
Network Application Classification Using Motif Coloring
C Lever
Wake Forest University, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–18