Follow
Chaz Lever
Title
Cited by
Cited by
Year
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017
23852017
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019
4472019
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1582017
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
1072017
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
1032019
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
20th Annual Network & Distributed System Security Symposium, 2013
982013
Domain-Z: 28 Registration Later - Measuring the Exploitation of Residual Trust in Domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
952016
Enabling Network Security Through Active DNS Datasets
A Kountouras, P Kintis, C Lever, Y Chen, Y Nadji, D Dagon, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 2016
892016
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
O Alrawi, C Lever, K Valakuzhy, K Snow, F Monrose, M Antonakakis
30th USENIX Security Symposium (USENIX Security 21), 3505-3522, 2021
842021
Whitewash: Outsourcing garbled circuit generation for mobile devices
H Carter, C Lever, P Traynor
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
642014
Security in plain txt: Observing the use of dns txt records in the wild
A Portier, H Carter, C Lever
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
112019
Graph mining of motif profiles for computer network activity inference
W Turkett, E Fulp, C Lever, JE Allan
Ninth Workshop on Mining and Learning with Graphs, 2011
112011
Understanding the Growth and Security Considerations of ECS.
A Kountouras, P Kintis, A Avgetidis, T Papastergiou, C Lever, ...
NDSS, 2021
62021
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators
A Avgetidis, O Alrawi, K Valakuzhy, C Lever, P Burbage, AD Keromytis, ...
32nd USENIX security symposium (USENIX Security 23), 5307-5324, 2023
42023
R. Court, K. Snow, F. Monrose, and M. Antonakakis,“The circle of life: A Large-Scale study of the IoT malware lifecycle,”
O Alrawi, C Lever, K Valakuzhy
30th USENIX Security Symposium (USENIX Security 21), 3505-3522, 0
4
Hiding in plain sight
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
22017
Dawn of the dead domain: Measuring the exploitation of residual trust in domains
C Lever, RJ Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
IEEE Security & Privacy 15 (2), 70-77, 2017
22017
Domain-Z: 28 Registrations Later
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy
A Faulkenberry, A Avgetidis, Z Ma, O Alrawi, C Lever, P Kintis, F Monrose, ...
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
12022
EMPIRICAL ANALYSIS OF EXISTING AND EMERGING THREATS AT SCALE USING DNS
C Lever
Georgia Institute of Technology, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20