Seth Hall
Seth Hall
Research Engineer, International Computer Science Institute
Verified email at icir.org - Homepage
Title
Cited by
Cited by
Year
Extracting certificates from live traffic: A near real-time SSL notary service
B Amann, M Vallentin, S Hall, R Sommer
Technical Report TR-12-014, ICSI, 2012
422012
No attack necessary: The surprising dynamics of SSL trust relationships
B Amann, R Sommer, M Vallentin, S Hall
Proceedings of the 29th annual computer security applications conference …, 2013
382013
Revisiting SSL: A large-scale study of the internet’s most trusted protocol
B Amann, M Vallentin, S Hall, R Sommer
ICSI, Tech. Rep., 2012
262012
A lone wolf no more: Supporting network intrusion detection with real-time intelligence
B Amann, R Sommer, A Sharma, S Hall
International Workshop on Recent Advances in Intrusion Detection, 314-333, 2012
242012
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
2015-12-20]. https:∥ www. bro. org, 2012
242012
Spicy: a unified deep packet inspection framework for safely dissecting all your data
R Sommer, J Amann, S Hall
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
15*2016
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks
J Amann, S Hall, R Sommer
10*
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates
J Amann, R Sommer, M Vallentin, S Hall
TinyToCS 3, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–8