Manos Antonakakis
Manos Antonakakis
Verified email at - Homepage
Cited by
Cited by
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017
From {Throw-Away} Traffic to Bots: Detecting the Rise of {DGA-Based} Malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
21st USENIX Security Symposium (USENIX Security 12), 491-506, 2012
Building a Dynamic Reputation System for {DNS}
M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster
19th USENIX Security Symposium (USENIX Security 10), 2010
Detecting Malware Domains at the Upper {DNS} Hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou II, D Dagon
20th USENIX Security Symposium (USENIX Security 11), 2011
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019
Method and system for detecting DGA-based malware
M Antonakakis, R Perdisci, W Lee, IN Vasiloglou
US Patent 9,922,190, 2018
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
D Dagon, M Antonakakis, P Vixie, T Jinmei, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Method and system for detecting malicious domain names at an upper DNS hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou
US Patent 8,631,489, 2014
Method and system for determining whether domain names are legitimate or malicious
M Antonakakis, R Perdisci, D Dagon, W Lee
US Patent 9,516,058, 2016
Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks
B Rahbarinia, R Perdisci, M Antonakakis
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
SoK: The challenges, pitfalls, and perils of using hardware performance counters for security
S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose
2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019
Method and system for detecting malware
E Antonakakis, R Perdisci, W Lee, G Ollmann
US Patent 8,578,497, 2013
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th USENIX Security Symposium (USENIX Security 15), 1025-1040, 2015
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE symposium on security and privacy (SP), 691-706, 2016
Electromagnetic signatures of WLAN cards and network security
KA Remley, CA Grosvenor, RT Johnk, DR Novotny, PD Hale, ...
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
Enabling network security through active DNS datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20