Maciej Korczynski

Orcid: 0000-0002-4334-3260

According to our database1, Maciej Korczynski authored at least 64 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Guardians of the Galaxy: Content Moderation in the InterPlanetary File System.
Proceedings of the 33rd USENIX Security Symposium, 2024

Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings.
Proceedings of the 8th Network Traffic Measurement and Analysis Conference, 2024

Shielding Brands: An In-Depth Analysis of Defensive Domain Registration Practices Against Cyber-Squatting.
Proceedings of the 8th Network Traffic Measurement and Analysis Conference, 2024

Spoofed Emails: An Analysis of the Issues Hindering a Larger Deployment of DMARC.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

WHOIS Right? An Analysis of WHOIS and RDAP Consistency.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

Zeros Are Heroes: NSEC3 Parameter Settings in the Wild.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Looking AT the Blue Skies of Bluesky.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Stress Testing the DMARC Reporting System: Compliance with Standards and Ways of Improvement.
Proceedings of the 20th International Conference on emerging Networking EXperiments and Technologies, 2024

Characterizing and Mitigating Phishing Attacks at ccTLD Scale.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation.
IEEE/ACM Trans. Netw., December, 2023

Security Reputation Metrics.
CoRR, 2023

Source Address Validation.
CoRR, 2023

Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Intercept and Inject: DNS Response Manipulation in the Wild.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Operational Domain Name Classification: From Automatic Ground Truth Generation to Adaptation to Missing Values.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

The Cloud Strikes Back: Investigating the Decentralization of IPFS.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023

Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Study on Domain Name System (DNS) Abuse: Technical Report.
CoRR, 2022

Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

Early Detection of Spam Domains with Passive DNS and SPF.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

2021
Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis.
IEEE Trans. Netw. Serv. Manag., 2021

Semantic Identifiers and DNS Names for IoT.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic.
CoRR, 2020

From Defensive Registration to Subdomain Protection: Evaluation of Email Anti-Spoofing Schemes for High-Profile Domains.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020

A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Are You Human?: Resilience of Phishing Detection to Evasion Techniques Based on Human Verification.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Feasibility of Large-Scale Vulnerability Notifications after GDPR.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

COMAR: Classification of Compromised versus Maliciously Registered Domains.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers.
Proceedings of the ANRW '20: Applied Networking Research Workshop, 2020

2019
Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

MLSEC - Benchmarking Shallow and Deep Machine Learning Models for Network Security.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse.
ACM Trans. Internet Techn., 2018

Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018

In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists.
Proceedings of the Internet Measurement Conference 2018, 2018

Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Anomaly detection through information sharing under different topologies.
EURASIP J. Inf. Secur., 2017

Traffic Measurements for Cyber Security.
IEEE Commun. Mag., 2017

Using Loops Observed in Traceroute to Infer the Ability to Spoof.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

No domain left behind: is Let's Encrypt democratizing encryption?
Proceedings of the Applied Networking Research Workshop, 2017

2016
Developing Security Reputation Metrics for Hosting Providers.
CoRR, 2016

Evaluating the Impact of AbuseHUB on Botnet Mitigation.
CoRR, 2016

Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense.
IEEE Commun. Mag., 2016

Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Apples, oranges and hosting providers: Heterogeneity and security in the hosting market.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

2014
Markov chain fingerprinting to classify encrypted traffic.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Two Methods for Detecting Malware.
Proceedings of the Multimedia Communications, Services and Security, 2013

2012
Classification de flux applicatifs et détection d'intrusion dans le trafic Internet. (Classifying Application Flows and Intrusion Detection in Internet Traffic).
PhD thesis, 2012

Classifying service flows in the encrypted skype traffic.
Proceedings of IEEE International Conference on Communications, 2012

2011
An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans.
Proceedings of IEEE International Conference on Communications, 2011


  Loading...