What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Leyla Bilge
Google Scholar
ORCID:
0000-0002-8408-3741
28
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams.
Platon Kotzias
Michalis Pachilakis
Javier Aldana-Iuit
Juan Caballero
Iskander Sánchez-Rola
Leyla Bilge
2023
conf/ccs
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Savino Dambra
Yufei Han
Simone Aonzo
Platon Kotzias
Antonino Vitale
Juan Caballero
Davide Balzarotti
Leyla Bilge
2023
conf/uss
Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages.
Iskander Sánchez-Rola
Leyla Bilge
Davide Balzarotti
Armin Buescher
Petros Efstathopoulos
2023
conf/uss
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Savino Dambra
Leyla Bilge
Platon Kotzias
Yun Shen
Juan Caballero
2023
conf/acsac
Domain and Website Attribution beyond WHOIS.
Silvia Sebastián
Raluca-Georgia Diugan
Juan Caballero
Iskander Sánchez-Rola
Leyla Bilge
2023
conf/acsac
Scamdog Millionaire: Detecting E-commerce Scams in the Wild.
Platon Kotzias
Kevin A. Roundy
Michalis Pachilakis
Iskander Sánchez-Rola
Leyla Bilge
2022
conf/uss
When Sally Met Trackers: Web Tracking From the Users' Perspective.
Savino Dambra
Iskander Sánchez-Rola
Leyla Bilge
Davide Balzarotti
2022
conf/sp
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
Iskander Sánchez-Rola
Matteo Dell'Amico
Davide Balzarotti
Pierre-Antoine Vervier
Leyla Bilge
2021
conf/uss
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World.
Erin Avllazagaj
Ziyun Zhu
Leyla Bilge
Davide Balzarotti
Tudor Dumitras
2021
conf/sp
How Did That Get In My Phone? Unwanted App Distribution on Android Devices.
Platon Kotzias
Juan Caballero
Leyla Bilge
2021
conf/ndss
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
Alexander Küchler
Alessandro Mantovani
Yufei Han
Leyla Bilge
Davide Balzarotti
2020
conf/sp
SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap.
Savino Dambra
Leyla Bilge
Davide Balzarotti
2020
conf/acsac
The Tangled Genealogy of IoT Malware.
Emanuele Cozzi
Pierre-Antoine Vervier
Matteo Dell'Amico
Yun Shen
Leyla Bilge
Davide Balzarotti
2019
conf/ccs
Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control.
Iskander Sánchez-Rola
Matteo Dell'Amico
Platon Kotzias
Davide Balzarotti
Leyla Bilge
Pierre-Antoine Vervier
Igor Santos
2019
conf/ndss
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
Platon Kotzias
Leyla Bilge
Pierre-Antoine Vervier
Juan Caballero
2017
conf/ccs
RiskTeller: Predicting the Risk of Cyber Incidents.
Leyla Bilge
Yufei Han
Matteo Dell'Amico
2017
conf/acsac
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data.
Matteo Dell'Amico
Leyla Bilge
Ashwin Kumar Kayyoor
Petros Efstathopoulos
Pierre-Antoine Vervier
2016
conf/uss
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.
Platon Kotzias
Leyla Bilge
Juan Caballero
2015
conf/ccs
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics.
Bum Jun Kwon
Jayanta Mondal
Jiyong Jang
Leyla Bilge
Tudor Dumitras
2015
conf/uss
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.
Mariano Graziano
Davide Canali
Leyla Bilge
Andrea Lanzi
Davide Balzarotti
2015
conf/fc
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks.
Olivier Thonnard
Leyla Bilge
Anand Kashyap
Martin Lee
2015
conf/sp
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Antonio Nappa
Richard Johnson
Leyla Bilge
Juan Caballero
Tudor Dumitras
2014
conf/ccs
On the effectiveness of risk prediction based on users browsing behavior.
Davide Canali
Leyla Bilge
Davide Balzarotti
2012
conf/ccs
Before we knew it: an empirical study of zero-day attacks in the real world.
Leyla Bilge
Tudor Dumitras
2012
conf/acsac
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Leyla Bilge
Davide Balzarotti
William K. Robertson
Engin Kirda
Christopher Kruegel
2011
conf/ndss
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Leyla Bilge
Engin Kirda
Christopher Kruegel
Marco Balduzzi
2010
conf/acsac
G-Free: defeating return-oriented programming through gadget-less binaries.
Kaan Onarlioglu
Leyla Bilge
Andrea Lanzi
Davide Balzarotti
Engin Kirda
2009
conf/esorics
Automatically Generating Models for Botnet Detection.
Peter Wurzinger
Leyla Bilge
Thorsten Holz
Jan Goebel
Christopher Kruegel
Engin Kirda
Coauthors
Alessandro Mantovani
(1)
Alexander Küchler
(1)
Anand Kashyap
(1)
Andrea Lanzi
(2)
Antonino Vitale
(1)
Antonio Nappa
(1)
Armin Buescher
(1)
Ashwin Kumar Kayyoor
(1)
Bum Jun Kwon
(1)
Christopher Kruegel
(3)
Davide Balzarotti
(13)
Davide Canali
(2)
Emanuele Cozzi
(1)
Engin Kirda
(4)
Erin Avllazagaj
(1)
Igor Santos
(1)
Iskander Sánchez-Rola
(7)
Jan Goebel
(1)
Javier Aldana-Iuit
(1)
Jayanta Mondal
(1)
Jiyong Jang
(1)
Juan Caballero
(8)
Kaan Onarlioglu
(1)
Kevin A. Roundy
(1)
Leyla Bilge
(28)
Marco Balduzzi
(1)
Mariano Graziano
(1)
Martin Lee
(1)
Matteo Dell'Amico
(5)
Michalis Pachilakis
(2)
Olivier Thonnard
(1)
Peter Wurzinger
(1)
Petros Efstathopoulos
(2)
Pierre-Antoine Vervier
(5)
Platon Kotzias
(8)
Raluca-Georgia Diugan
(1)
Richard Johnson
(1)
Savino Dambra
(4)
Silvia Sebastián
(1)
Simone Aonzo
(1)
Thorsten Holz
(1)
Tudor Dumitras
(4)
William K. Robertson
(1)
Yufei Han
(3)
Yun Shen
(2)
Ziyun Zhu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to