Leyla Bilge

Orcid: 0000-0002-8408-3741

According to our database1, Leyla Bilge authored at least 38 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments.
ACM Trans. Priv. Secur., May, 2023

Quantifying Carbon Emissions due to Online Third-Party Tracking.
CoRR, 2023

Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages.
Proceedings of the 32nd USENIX Security Symposium, 2023

One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Proceedings of the 32nd USENIX Security Symposium, 2023

Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Domain and Website Attribution beyond WHOIS.
Proceedings of the Annual Computer Security Applications Conference, 2023

Scamdog Millionaire: Detecting E-commerce Scams in the Wild.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
When Sally Met Trackers: Web Tracking From the Users' Perspective.
Proceedings of the 31st USENIX Security Symposium, 2022

Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Unsupervised Detection and Clustering of Malicious TLS Flows.
CoRR, 2021

When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World.
Proceedings of the 30th USENIX Security Symposium, 2021

How Did That Get In My Phone? Unwanted App Distribution on Android Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

The Tangled Genealogy of IoT Malware.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Spearphishing Malware: Do We Really Know the Unknown?
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2017
RiskTeller: Predicting the Risk of Cyber Incidents.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence.
Proceedings of the 24th USENIX Security Symposium, 2015

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks.
Proceedings of the Financial Cryptography and Data Security, 2015

Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains.
ACM Trans. Inf. Syst. Secur., 2014

On the effectiveness of risk prediction based on users browsing behavior.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Investigating Zero-Day Attacks.
login Usenix Mag., 2013

2012
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Before we knew it: an empirical study of zero-day attacks in the real world.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2011

Thwarting real-time dynamic unpacking.
Proceedings of the Fourth European Workshop on System Security, 2011

2010
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

G-Free: defeating return-oriented programming through gadget-less binaries.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
All your contacts are belong to us: automated identity theft attacks on social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Automatically Generating Models for Botnet Detection.
Proceedings of the Computer Security, 2009


  Loading...