Manos Antonakakis

Orcid: 0000-0003-1578-8307

According to our database1, Manos Antonakakis authored at least 55 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned.
CoRR, 2024

Discovering and Measuring CDNs Prone to Domain Fronting.
Proceedings of the ACM on Web Conference 2024, 2024

Practical Attacks Against DNS Reputation Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators.
Proceedings of the 32nd USENIX Security Symposium, 2023

Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Returning to Port: Efficient Detection of Home Router Devices.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
What's in a Name? Exploring CA Certificate Control.
Proceedings of the 30th USENIX Security Symposium, 2021

The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle.
Proceedings of the 30th USENIX Security Symposium, 2021

Understanding the Growth and Security Considerations of ECS.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

An Inside Look into the Practice of Malware Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
Proceedings of the World Wide Web Conference, 2019

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

SoK: Security Evaluation of Home-Based IoT Deployments.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

An Empirical Study of the I2P Anonymity Network and its Censorship Resistance.
Proceedings of the Internet Measurement Conference 2018, 2018

Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Still Beheading Hydras: Botnet Takedowns Then and Now.
IEEE Trans. Dependable Secur. Comput., 2017

Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains.
IEEE Secur. Priv., 2017

By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers.
CoRR, 2017

Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet.
Comput. Secur., 2017

Towards designing effective visualizations for DNS-based network threat analysis.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017


A Lustrum of Malware Network Communication: Evolution and Insights.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Measuring Network Reputation in the Ad-Bidding Process.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Practical Attacks Against Graph-based Clustering.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
ACM Trans. Priv. Secur., 2016

Towards Measuring and Mitigating Social Engineering Software Download Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Enabling Network Security Through Active DNS Datasets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution.
Proceedings of the Computer Security - ESORICS 2016, 2016

Understanding the Privacy Implications of ECS - (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths.
Proceedings of the 24th USENIX Security Symposium, 2015

Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Connected Colors: Unveiling the Structure of Criminal Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

SinkMiner: Mining Botnet Sinkholes for Fun and Profit.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Measuring and Detecting Malware Downloads in Live Network Traffic.
Proceedings of the Computer Security - ESORICS 2013, 2013

Beheading hydras: performing effective botnet takedowns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Detecting and Tracking the Rise of DGA-Based Malware.
login Usenix Mag., 2012

From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Detecting Malware Domains at the Upper DNS Hierarchy.
Proceedings of the 20th USENIX Security Symposium, 2011

Understanding the prevalence and use of alternative plans in malware with network games.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Building a Dynamic Reputation System for DNS.
Proceedings of the 19th USENIX Security Symposium, 2010

A Centralized Monitoring Infrastructure for Improving DNS Security.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Recursive DNS Architectures and Vulnerability Implications.
Proceedings of the Network and Distributed System Security Symposium, 2009

WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008


  Loading...