What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vern Paxson
Google Scholar
67
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/uss
Network Detection of Interactive SSH Impostors Using Deep Learning.
Julien Piet
Aashish Sharma
Vern Paxson
David A. Wagner
2021
conf/uss
Hopper: Modeling and Detecting Lateral Movement.
Grant Ho
Mayank Dhiman
Devdatta Akhawe
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2020
conf/uss
Composition Kills: A Case Study of Email Sender Authentication.
Jianjun Chen
Vern Paxson
Jian Jiang
2019
conf/uss
Detecting and Characterizing Lateral Phishing at Scale.
Grant Ho
Asaf Cidon
Lior Gavish
Marco Schweighauser
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2018
conf/uss
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Jianjun Chen
Jian Jiang
Hai-Xin Duan
Tao Wan
Shuo Chen
Vern Paxson
Min Yang
2018
conf/uss
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability.
Michael Carl Tschantz
Sadia Afroz
Shaarif Sajid
Shoaib Asif Qazi
Mobin Javed
Vern Paxson
2017
journals/popets
Social Engineering Attacks on Government Opponents: Target Perspectives.
William R. Marczak
Vern Paxson
2017
conf/ccs
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Kurt Thomas
Frank Li
Ali Zand
Jacob Barrett
Juri Ranieri
Luca Invernizzi
Yarik Markov
Oxana Comanescu
Vijay Eranti
Angelika Moscicki
Daniel Margolis
Vern Paxson
Elie Bursztein
2017
conf/ccs
A Large-Scale Empirical Study of Security Patches.
Frank Li
Vern Paxson
2017
conf/uss
Detecting Credential Spearphishing in Enterprise Settings.
Grant Ho
Aashish Sharma
Mobin Javed
Vern Paxson
David A. Wagner
2017
conf/uss
Characterizing the Nature and Dynamics of Tor Exit Blocking.
Rachee Singh
Rishab Nithyanand
Sadia Afroz
Paul Pearce
Michael Carl Tschantz
Phillipa Gill
Vern Paxson
2017
conf/uss
Global Measurement of DNS Manipulation.
Paul Pearce
Ben Jones
Frank Li
Roya Ensafi
Nick Feamster
Nicholas Weaver
Vern Paxson
2017
conf/sp
Augur: Internet-Wide Detection of Connectivity Disruptions.
Paul Pearce
Roya Ensafi
Frank Li
Nick Feamster
Vern Paxson
2017
conf/ndss
The Security Impact of HTTPS Interception.
Zakir Durumeric
Zane Ma
Drew Springall
Richard Barnes
Nick Sullivan
Elie Bursztein
Michael D. Bailey
J. Alex Halderman
Vern Paxson
2016
journals/popets
Towards Mining Latent Client Identifiers from Network Traffic.
Sakshi Jain
Mobin Javed
Vern Paxson
2016
conf/ccs
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Shuang Hao
Alex Kantchelian
Brad Miller
Vern Paxson
Nick Feamster
2016
conf/ccs
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Jianjun Chen
Jian Jiang
Hai-Xin Duan
Nicholas Weaver
Tao Wan
Vern Paxson
2016
conf/uss
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Frank Li
Zakir Durumeric
Jakub Czyz
Mohammad Karami
Michael D. Bailey
Damon McCoy
Stefan Savage
Vern Paxson
2016
conf/sp
SoK: Towards Grounding Censorship Circumvention in Empiricism.
Michael Carl Tschantz
Sadia Afroz
anonymous
Vern Paxson
2016
conf/ndss
Do You See What I See? Differential Treatment of Anonymous Users.
Sheharbano Khattak
David Fifield
Sadia Afroz
Mobin Javed
Srikanth Sundaresan
Damon McCoy
Vern Paxson
Steven J. Murdoch
2016
conf/ndss
Forwarding-Loop Attacks in Content Delivery Networks.
Jianjun Chen
Xiaofeng Zheng
Hai-Xin Duan
Jinjin Liang
Jian Jiang
Kang Li
Tao Wan
Vern Paxson
2015
journals/popets
Blocking-resistant communication through domain fronting.
David Fifield
Chang Lan
Rod Hynes
Percy Wegmann
Vern Paxson
2015
conf/ccs
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Frank Li
Richard Shin
Vern Paxson
2015
conf/sp
Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.
Ryan Rasti
Mukul Murthy
Nicholas Weaver
Vern Paxson
2015
conf/sp
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Kurt Thomas
Elie Bursztein
Chris Grier
Grant Ho
Nav Jagpal
Alexandros Kapravelos
Damon McCoy
Antonio Nappa
Vern Paxson
Paul Pearce
Niels Provos
Moheeb Abu Rajab
2015
conf/cns
GFlux: A google-based system for Fast Flux detection.
Basheer Al-Duwairi
Ahmad T. Al-Hammouri
Monther Aldwairi
Vern Paxson
2014
conf/ccs
Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Kurt Thomas
Frank Li
Chris Grier
Vern Paxson
2014
conf/ccs
Characterizing Large-Scale Click Fraud in ZeroAccess.
Paul Pearce
Vacha Dave
Chris Grier
Kirill Levchenko
Saikat Guha
Damon McCoy
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2014
conf/uss
When Governments Hack Opponents: A Look at Actors and Technology.
William R. Marczak
John Scott-Railton
Morgan Marquis-Boire
Vern Paxson
2014
conf/uss
Hulk: Eliciting Malicious Behavior in Browser Extensions.
Alexandros Kapravelos
Chris Grier
Neha Chachra
Christopher Kruegel
Giovanni Vigna
Vern Paxson
2013
conf/ccs
Detecting stealthy, distributed SSH brute-forcing.
Mobin Javed
Vern Paxson
2013
conf/uss
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Vern Paxson
Mihai Christodorescu
Mobin Javed
Josyula R. Rao
Reiner Sailer
Douglas Lee Schales
Marc Ph. Stoecklin
Kurt Thomas
Wietse Z. Venema
Nicholas Weaver
2013
conf/uss
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Kurt Thomas
Damon McCoy
Chris Grier
Alek Kolcz
Vern Paxson
2013
conf/uss
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Sheharbano Khattak
Mobin Javed
Philip D. Anderson
Vern Paxson
2012
conf/ccs
Manufacturing compromise: the emergence of exploit-as-a-service.
Chris Grier
Lucas Ballard
Juan Caballero
Neha Chachra
Christian J. Dietrich
Kirill Levchenko
Panayiotis Mavrommatis
Damon McCoy
Antonio Nappa
Andreas Pitsillidis
Niels Provos
M. Zubair Rafique
Moheeb Abu Rajab
Christian Rossow
Kurt Thomas
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2012
conf/sp
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
Christian Rossow
Christian J. Dietrich
Chris Grier
Christian Kreibich
Vern Paxson
Norbert Pohlmann
Herbert Bos
Maarten van Steen
2011
journals/tifs
Towards Situational Awareness of Large-Scale Botnet Probing Events.
Zhichun Li
Anup Goyal
Yan Chen
Vern Paxson
2011
conf/uss
Show Me the Money: Characterizing Spam-advertised Revenue.
Chris Kanich
Nicholas Weaver
Damon McCoy
Tristan Halvorson
Christian Kreibich
Kirill Levchenko
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2011
conf/uss
Measuring Pay-per-Install: The Commoditization of Malware Distribution.
Juan Caballero
Chris Grier
Christian Kreibich
Vern Paxson
2011
conf/uss
Redirecting DNS for Ads and Profit.
Nicholas Weaver
Christian Kreibich
Vern Paxson
2011
conf/sp
Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Kirill Levchenko
Andreas Pitsillidis
Neha Chachra
Brandon Enright
Márk Félegyházi
Chris Grier
Tristan Halvorson
Chris Kanich
Christian Kreibich
He Liu
Damon McCoy
Nicholas Weaver
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2011
conf/sp
Design and Evaluation of a Real-Time URL Spam Filtering Service.
Kurt Thomas
Chris Grier
Justin Ma
Vern Paxson
Dawn Song
2010
conf/ccs
@spam: the underground on 140 characters or less.
Chris Grier
Kurt Thomas
Vern Paxson
Chao Michael Zhang
2010
conf/sp
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.
Robin Sommer
Vern Paxson
2010
conf/ndss
Botnet Judo: Fighting Spam with Itself.
Andreas Pitsillidis
Kirill Levchenko
Christian Kreibich
Chris Kanich
Geoffrey M. Voelker
Vern Paxson
Nicholas Weaver
Stefan Savage
2009
conf/ccs
Automating analysis of large-scale botnet probing events.
Zhichun Li
Anup Goyal
Yan Chen
Vern Paxson
2009
conf/ndss
Detecting Forged TCP Reset Packets.
Nicholas Weaver
Robin Sommer
Vern Paxson
2008
conf/ccs
Spamalytics: an empirical analysis of spam marketing conversion.
Chris Kanich
Christian Kreibich
Kirill Levchenko
Brandon Enright
Geoffrey M. Voelker
Vern Paxson
Stefan Savage
2008
conf/uss
Principles for Developing Comprehensive Network Visibility.
Mark Allman
Christian Kreibich
Vern Paxson
Robin Sommer
Nicholas Weaver
2008
conf/sp
Efficient and Robust TCP Stream Normalization.
Mythili Vutukuru
Hari Balakrishnan
Vern Paxson
2007
conf/ccs
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention.
José M. González
Vern Paxson
Nicholas Weaver
2007
conf/ccs
An inquiry into the nature and causes of the wealth of internet miscreants.
Jason Franklin
Adrian Perrig
Vern Paxson
Stefan Savage
2007
conf/uss
The Strengths of Weaker Identities: Opportunistic Personas.
Mark Allman
Christian Kreibich
Vern Paxson
Robin Sommer
Nicholas Weaver
2006
conf/uss
Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Vern Paxson
Krste Asanovic
Sarang Dharmapurikar
John W. Lockwood
Ruoming Pang
Robin Sommer
Nicholas Weaver
2006
conf/ndss
Protocol-Independent Adaptive Replay of Application Dialog.
Weidong Cui
Vern Paxson
Nicholas Weaver
Randy H. Katz
2005
conf/uss
Robust TCP Stream Reassembly in the Presence of Adversaries.
Sarang Dharmapurikar
Vern Paxson
2005
conf/acsac
Exploiting Independent State For Network Intrusion Detection.
Robin Sommer
Vern Paxson
2004
conf/ccs
Operational experiences with high-volume network intrusion detection.
Holger Dreger
Anja Feldmann
Vern Paxson
Robin Sommer
2004
conf/uss
Very Fast Containment of Scanning Worms.
Nicholas Weaver
Stuart Staniford
Vern Paxson
2004
conf/sp
Fast Portscan Detection Using Sequential Hypothesis Testing.
Jaeyeon Jung
Vern Paxson
Arthur W. Berger
Hari Balakrishnan
2003
conf/ccs
Enhancing byte-level network intrusion detection signatures with context.
Robin Sommer
Vern Paxson
2003
conf/sp
Active Mapping: Resisting NIDS Evasion without Altering Traffic.
Umesh Shankar
Vern Paxson
2002
conf/uss
How to Own the Internet in Your Spare Time.
Stuart Staniford
Vern Paxson
Nicholas Weaver
2001
conf/uss
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics.
Mark Handley
Vern Paxson
Christian Kreibich
2000
conf/uss
Detecting Stepping Stones.
Yin Zhang
Vern Paxson
2000
conf/uss
Detecting Backdoors.
Yin Zhang
Vern Paxson
1998
conf/uss
Bro: A System for Detecting Network Intruders in Real-Time.
Vern Paxson
Coauthors
Aashish Sharma
(2)
Adrian Perrig
(1)
Ahmad T. Al-Hammouri
(1)
Alek Kolcz
(1)
Alex Kantchelian
(1)
Alexandros Kapravelos
(2)
Ali Zand
(1)
Andreas Pitsillidis
(3)
Angelika Moscicki
(1)
Anja Feldmann
(1)
anonymous
(1)
Antonio Nappa
(2)
Anup Goyal
(2)
Arthur W. Berger
(1)
Asaf Cidon
(1)
Basheer Al-Duwairi
(1)
Ben Jones
(1)
Brad Miller
(1)
Brandon Enright
(2)
Chang Lan
(1)
Chao Michael Zhang
(1)
Chris Grier
(11)
Chris Kanich
(4)
Christian J. Dietrich
(2)
Christian Kreibich
(10)
Christian Rossow
(2)
Christopher Kruegel
(1)
Damon McCoy
(8)
Daniel Margolis
(1)
David A. Wagner
(4)
David Fifield
(2)
Dawn Song
(1)
Devdatta Akhawe
(1)
Douglas Lee Schales
(1)
Drew Springall
(1)
Elie Bursztein
(3)
Frank Li
(7)
Geoffrey M. Voelker
(8)
Giovanni Vigna
(1)
Grant Ho
(4)
Hai-Xin Duan
(3)
Hari Balakrishnan
(2)
He Liu
(1)
Herbert Bos
(1)
Holger Dreger
(1)
J. Alex Halderman
(1)
Jacob Barrett
(1)
Jaeyeon Jung
(1)
Jakub Czyz
(1)
Jason Franklin
(1)
Jian Jiang
(4)
Jianjun Chen
(4)
Jinjin Liang
(1)
John Scott-Railton
(1)
John W. Lockwood
(1)
José M. González
(1)
Josyula R. Rao
(1)
Juan Caballero
(2)
Julien Piet
(1)
Juri Ranieri
(1)
Justin Ma
(1)
Kang Li
(1)
Kirill Levchenko
(6)
Krste Asanovic
(1)
Kurt Thomas
(8)
Lior Gavish
(1)
Luca Invernizzi
(1)
Lucas Ballard
(1)
M. Zubair Rafique
(1)
Maarten van Steen
(1)
Marc Ph. Stoecklin
(1)
Marco Schweighauser
(1)
Mark Allman
(2)
Márk Félegyházi
(1)
Mark Handley
(1)
Mayank Dhiman
(1)
Michael Carl Tschantz
(3)
Michael D. Bailey
(2)
Mihai Christodorescu
(1)
Min Yang
(1)
Mobin Javed
(7)
Mohammad Karami
(1)
Moheeb Abu Rajab
(2)
Monther Aldwairi
(1)
Morgan Marquis-Boire
(1)
Mukul Murthy
(1)
Mythili Vutukuru
(1)
Nav Jagpal
(1)
Neha Chachra
(3)
Nicholas Weaver
(16)
Nick Feamster
(3)
Nick Sullivan
(1)
Niels Provos
(2)
Norbert Pohlmann
(1)
Oxana Comanescu
(1)
Panayiotis Mavrommatis
(1)
Paul Pearce
(5)
Percy Wegmann
(1)
Philip D. Anderson
(1)
Phillipa Gill
(1)
Rachee Singh
(1)
Randy H. Katz
(1)
Reiner Sailer
(1)
Richard Barnes
(1)
Richard Shin
(1)
Rishab Nithyanand
(1)
Robin Sommer
(8)
Rod Hynes
(1)
Roya Ensafi
(2)
Ruoming Pang
(1)
Ryan Rasti
(1)
Sadia Afroz
(4)
Saikat Guha
(1)
Sakshi Jain
(1)
Sarang Dharmapurikar
(2)
Shaarif Sajid
(1)
Sheharbano Khattak
(2)
Shoaib Asif Qazi
(1)
Shuang Hao
(1)
Shuo Chen
(1)
Srikanth Sundaresan
(1)
Stefan Savage
(10)
Steven J. Murdoch
(1)
Stuart Staniford
(2)
Tao Wan
(3)
Tristan Halvorson
(2)
Umesh Shankar
(1)
Vacha Dave
(1)
Vern Paxson
(67)
Vijay Eranti
(1)
Weidong Cui
(1)
Wietse Z. Venema
(1)
William R. Marczak
(2)
Xiaofeng Zheng
(1)
Yan Chen
(2)
Yarik Markov
(1)
Yin Zhang
(2)
Zakir Durumeric
(2)
Zane Ma
(1)
Zhichun Li
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to