Cited By
View all- Davanian AFaloutsos MLindorfer MQuek TGao DZhou JCardenas A(2024)C2Miner: Tricking IoT Malware into Revealing Live Command & Control ServersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644992(112-127)Online publication date: 1-Jul-2024
- Davanian AFaloutsos MBarakat CPelsser CBenson TChoffnes D(2022)MalNetProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561463(472-487)Online publication date: 25-Oct-2022
- Yong Wong MLanden MAntonakakis MBlough DRedmiles EAhamad MKim YKim JVigna GShi E(2021)An Inside Look into the Practice of Malware AnalysisProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484759(3053-3069)Online publication date: 12-Nov-2021
- Show More Cited By