Follow
Manos Antonakakis
Manos Antonakakis
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017
21252017
From {Throw-Away} Traffic to Bots: Detecting the Rise of {DGA-Based} Malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
21st USENIX Security Symposium (USENIX Security 12), 491-506, 2012
7002012
Building a dynamic reputation system for {DNS}
M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster
19th USENIX Security Symposium (USENIX Security 10), 2010
6522010
Detecting malware domains at the upper {DNS} hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou II, D Dagon
20th USENIX Security Symposium (USENIX Security 11), 2011
4152011
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019
3982019
Method and system for detecting DGA-based malware
M Antonakakis, R Perdisci, W Lee, IN Vasiloglou
US Patent 9,922,190, 2018
2972018
{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th USENIX Security Symposium (USENIX Security 15), 1025-1040, 2015
169*2015
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
D Dagon, M Antonakakis, P Vixie, T Jinmei, W Lee
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1512008
SoK: The challenges, pitfalls, and perils of using hardware performance counters for security
S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose
2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019
1472019
Hiding in plain sight: A longitudinal study of combosquatting abuse
P Kintis, N Miramirkhani, C Lever, Y Chen, R Romero-Gómez, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1462017
Method and system for detecting malicious domain names at an upper DNS hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou
US Patent 8,631,489, 2014
1352014
Method and system for determining whether domain names are legitimate or malicious
M Antonakakis, R Perdisci, D Dagon, W Lee
US Patent 9,516,058, 2016
1322016
Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks
B Rahbarinia, R Perdisci, M Antonakakis
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
1252015
Method and system for detecting malware
E Antonakakis, R Perdisci, W Lee, G Ollmann
US Patent 8,578,497, 2013
1062013
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
1002017
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
C Lever, M Antonakakis, B Reaves, P Traynor, W Lee
NDSS, 2013
992013
Beheading hydras: performing effective botnet takedowns
Y Nadji, M Antonakakis, R Perdisci, D Dagon, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
982013
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
912019
Electromagnetic signatures of WLAN cards and network security
KA Remley, CA Grosvenor, RT Johnk, DR Novotny, PD Hale, ...
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
912005
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE symposium on security and privacy (SP), 691-706, 2016
902016
The system can't perform the operation now. Try again later.
Articles 1–20