Follow
Manos Antonakakis
Manos Antonakakis
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017
26242017
From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
21st USENIX Security Symposium (USENIX Security 12), 491-506, 2012
7562012
Building a dynamic reputation system for {DNS}
M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster
19th USENIX Security Symposium (USENIX Security 10), 2010
6952010
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019
5132019
Detecting malware domains at the upper {DNS} hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou II, D Dagon
20th USENIX Security Symposium (USENIX Security 11), 2011
4322011
Method and system for detecting DGA-based malware
M Antonakakis, R Perdisci, W Lee, IN Vasiloglou
US Patent 9,922,190, 2018
3162018
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security
S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose
2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019
2102019
{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th USENIX Security Symposium (USENIX Security 15), 1025-1040, 2015
191*2015
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1712017
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
D Dagon, M Antonakakis, P Vixie, T Jinmei, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1602008
Method and system for determining whether domain names are legitimate or malicious
M Antonakakis, R Perdisci, D Dagon, W Lee
US Patent 9,516,058, 2016
1472016
Method and system for detecting malicious domain names at an upper DNS hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou
US Patent 8,631,489, 2014
1422014
Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks
B Rahbarinia, R Perdisci, M Antonakakis
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
1342015
Method and system for detecting malware
E Antonakakis, R Perdisci, W Lee, G Ollmann
US Patent 8,578,497, 2013
1202013
Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis
R Perdisci, T Papastergiou, O Alrawi, M Antonakakis
2020 IEEE european symposium on security and privacy (EuroS&P), 474-489, 2020
1152020
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
1152019
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
1082017
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1042013
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
O Alrawi, C Lever, K Valakuzhy, K Snow, F Monrose, M Antonakakis
30th USENIX Security Symposium (USENIX Security 21), 3505-3522, 2021
1012021
Practical attacks against graph-based clustering
Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1002017
The system can't perform the operation now. Try again later.
Articles 1–20