Scriptgen: an automated script generation tool for honeyd C Leita, K Mermoud, M Dacier Computer Security Applications Conference, 21st Annual, 12 pp.-214, 2005 | 282 | 2005 |
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots C Leita, M Dacier, F Massicotte Recent Advances in Intrusion Detection, 185-205, 2006 | 117 | 2006 |
SGNET: a worldwide deployable framework to support the analysis of malware threat models C Leita, M Dacier Dependable Computing Conference, 2008. EDCC 2008. Seventh European, 99-109, 2008 | 89 | 2008 |
An analysis of rogue AV campaigns M Cova, C Leita, O Thonnard, A Keromytis, M Dacier Recent Advances in Intrusion Detection, 442-463, 2011 | 87 | 2011 |
Large scale malware collection: lessons learned J Canto, M Dacier, E Kirda, C Leita IEEE SRDS Workshop on Sharing Field Data and Experiment Measurements on …, 2008 | 66 | 2008 |
An experimental study of diversity with off-the-shelf antivirus engines I Gashi, V Stankovic, C Leita, O Thonnard 2009 Eighth IEEE international symposium on network computing and …, 2009 | 64 | 2009 |
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet C Leita, VH Pham, O Thonnard, ES Ramirez, F Pouget, E Kirda, M Dacier Information Security Threats Data Collection and Sharing, 2008. WISTDCS'08 …, 2008 | 62 | 2008 |
Towards Network Containment in Malware Analysis Systems M Graziano, C Leita, D Balzarotti Annual Computer Security Applications Conference (ACSAC) 2012, 2012 | 39 | 2012 |
Exploiting diverse observation perspectives to get insights on the malware landscape C Leita, U Bayer, E Kirda Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International …, 2010 | 25 | 2010 |
HARMUR: Storing and analyzing historic data on malicious domains C Leita, M Cova Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 20 | 2011 |
SGNET: Implementation Insights C Leita, M Dacier Network Operations and Management Symposium, 2008. NOMS 2008. IEEE, 1075-1078, 2008 | 19 | 2008 |
SGNET: a distributed infrastructure to handle zero-day exploits C Leita, M Dacier, G Wicherski Institut Eurecom, France, Tech. Rep. EURECOM 2164, 2007 | 18 | 2007 |
SGNET: automated protocol learning for the observation of malicious threats C Leita EURECOM, 2008 | 17 | 2008 |
Creating Collaborative Applications Using the Fluid Computing Middleware C Leita IBM Zurich Research Laboratory, 2005 | 16 | 2005 |
Extracting inter-arrival time based behaviour from honeypot traffic using cliques S Almotairi, A Clark, M Dacier, C Leita, G Mohay, VH Pham, O Thonnard, ... School of Computer and Information Science, Edith Cowan University, Perth …, 2007 | 15 | 2007 |
Heuristics-based protocol labeling for industrial control systems C Leita, M Dacier US Patent 9,384,066, 2016 | 14 | 2016 |
Symantec report on rogue security software M Fossi, D Turner, E Johnson, T Mack, T Adams, J Blackbird, M Low, ... Whitepaper, Symantec, October, 2009 | 14 | 2009 |
Assessing cybercrime through the eyes of the WOMBAT M Dacier, C Leita, O Thonnard, H Van Pham, E Kirda Cyber Situational Awareness: Issues and Research, 103-136, 2009 | 10 | 2009 |
Gone rogue: An analysis of rogue security software campaigns M Cova, C Leita, O Thonnard, A Keromytis, M Dacier 2009 European Conference on Computer Network Defense, 1-3, 2009 | 9 | 2009 |
Server-side code injection attacks: A historical perspective J Fritz, C Leita, M Polychronakis International Workshop on Recent Advances in Intrusion Detection, 41-61, 2013 | 7 | 2013 |