Presentations
Permanent URI for this collection
Browse
Recent Submissions
Item Modern Spammer Infrastructure(2010-08-10) Straaten, Carel vanItem HProxy(2010-08-10) Joosen, Wouter; Nikiforakis, Nick; Younan, YvesItem Modeling and Containment of Search Worms Targeting Web Applications(2010-08-10) Hua, Jingyu; Sakurai, KouichiItem KIDS(2010-08-10) Mrdovic, SasaItem An Online Adaptive Approach to Alert Correlation(2010-08-10) Ghorbani, Ali; Ren, Hanli; Stakhanova, NataliaItem Concluding Remarks(2010-08-10) Flegel, Ulrich; Jahnke, MarkoItem Organizing Large Scale Hacking Competitions(2010-08-10) Boe, Bryce; Cavallaro, Lorenzo; Cavedon, Ludovico; Childers, Nick; Cova, Marco; Egele, Manuel; Vigna, GiovanniItem Why Johnny Can't Pentest(2010-08-10) Cova, Marco; Doupe, Adam; Vigna, GiovanniItem Covertly Probing Underground Economy Marketplaces(2010-08-10) Fallmann, Hanno; Platzer, Christian; Wondracek, GilbertItem Take a Deep Breath(2010-08-10) Balduzzi, Marco; Cavallaro, Lorenzo; Dell'Amico, Matteo; Fattori, Aristide; Nappa, AntonioItem dAnubis(2010-08-10) Bayer, Ulrich; Milani Comparetti, Paolo; Neugschwandtner, Matthias; Platzer, ChristianItem Conqueror(2010-08-10) Bruschi, Danilo; Martignoni, Lorenzo; Paleari, RobertoItem HookScout(2010-08-10) Hanna, Steve; Poosankam, Pongsin; Song, Dawn; Yan, Lok; Yin, HengItem Trends in Malevolence(2010-08-10) NazarioThis talk will explore the past, present, and future of Internet security, specifically the rise of the criminal online underworld. Our current situation of botnets for financial gain, rogue ISPs who support these attacks, spam, malware explosions, and the like are due to the past decade of tactical efforts. Understanding these "megatrends" is key to anticipating what will happen next and what kinds of technical—and policy—preparations we should make.Item Opening(2010-08-10) Jahnke, Marko; Martini, Peter