Manos Antonakakis
Orcid: 0000-0003-1578-8307
According to our database1,
Manos Antonakakis
authored at least 55 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned.
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators.
Proceedings of the 32nd USENIX Security Symposium, 2023
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the World Wide Web Conference, 2019
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Secur. Priv., 2017
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers.
CoRR, 2017
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet.
Comput. Secur., 2017
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
ACM Trans. Priv. Secur., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Understanding the prevalence and use of alternative plans in malware with network games.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008