University of Minnesota
Security and Privacy in Computing
index.php

Readings on: botnets, malware, and spam

Main reading for March 24th: Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, and Herbert Bos. “SoK: P2PWNED — modeling and evaluating the resilience of peer-to-peer botnets”. In IEEE Symposium on Security and Privacy (“Oakland”), pages 97–111, San Francisco, CA, USA, May 2013.
[IEEE]

Main reading for March 26th: Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker. “Manufacturing compromise: the emergence of exploit-as-a-service”. In ACM Conference on Computer and Communications Security, pages 821–832, Raleigh, NC, USA, November 2012.
[ACM]

Not selected: Vacha Dave, Saikat Guha, and Yin Zhang. “ViceROI: Catching click-spam in search ad networks”. In ACM Conference on Computer and Communications Security, pages 765–776, Berlin, Germany, November 2013.
[ACM]

Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, and Markus Jakobsson. “Scambaiter: Understanding targeted Nigerian scams on Craigslist”. In Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, February 2014.
[Internet Society]