default search action
Leyla Bilge
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Savino Dambra, Leyla Bilge, Davide Balzarotti:
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments. ACM Trans. Priv. Secur. 26(2): 16:1-16:30 (2023) - [c33]Platon Kotzias, Kevin A. Roundy, Michalis Pachilakis, Iskander Sánchez-Rola, Leyla Bilge:
Scamdog Millionaire: Detecting E-commerce Scams in the Wild. ACSAC 2023: 29-43 - [c32]Silvia Sebastián, Raluca-Georgia Diugan, Juan Caballero, Iskander Sánchez-Rola, Leyla Bilge:
Domain and Website Attribution beyond WHOIS. ACSAC 2023: 124-137 - [c31]Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. CCS 2023: 60-74 - [c30]Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos:
Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages. USENIX Security Symposium 2023: 4157-4173 - [c29]Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero:
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles. USENIX Security Symposium 2023: 5683-5700 - [i5]Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero:
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles. CoRR abs/2301.07346 (2023) - [i4]Michalis Pachilakis, Savino Dambra, Iskander Sánchez-Rola, Leyla Bilge:
Quantifying Carbon Emissions due to Online Third-Party Tracking. CoRR abs/2304.00927 (2023) - [i3]Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. CoRR abs/2307.14657 (2023) - 2022
- [c28]Iskander Sánchez-Rola, Matteo Dell'Amico, Davide Balzarotti, Pierre-Antoine Vervier, Leyla Bilge:
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships. SP 2022: 1990-2004 - [c27]Savino Dambra, Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti:
When Sally Met Trackers: Web Tracking From the Users' Perspective. USENIX Security Symposium 2022: 2189-2206 - 2021
- [c26]Alexander Küchler, Alessandro Mantovani, Yufei Han, Leyla Bilge, Davide Balzarotti:
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes. NDSS 2021 - [c25]Platon Kotzias, Juan Caballero, Leyla Bilge:
How Did That Get In My Phone? Unwanted App Distribution on Android Devices. SP 2021: 53-69 - [c24]Erin Avllazagaj, Ziyun Zhu, Leyla Bilge, Davide Balzarotti, Tudor Dumitras:
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World. USENIX Security Symposium 2021: 3487-3504 - [e4]Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves:
Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings. Lecture Notes in Computer Science 12756, Springer 2021, ISBN 978-3-030-80824-2 [contents] - [e3]Leyla Bilge, Tudor Dumitras:
RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021. ACM 2021, ISBN 978-1-4503-9058-3 [contents] - [i2]Gibran Gómez, Platon Kotzias, Matteo Dell'Amico, Leyla Bilge, Juan Caballero:
Unsupervised Detection and Clustering of Malicious TLS Flows. CoRR abs/2109.03878 (2021) - 2020
- [c23]Emanuele Cozzi, Pierre-Antoine Vervier, Matteo Dell'Amico, Yun Shen, Leyla Bilge, Davide Balzarotti:
The Tangled Genealogy of IoT Malware. ACSAC 2020: 1-16 - [c22]Savino Dambra, Leyla Bilge, Davide Balzarotti:
SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap. SP 2020: 1367-1383 - [e2]Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves:
Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12223, Springer 2020, ISBN 978-3-030-52682-5 [contents] - [e1]Manuel Egele, Leyla Bilge:
23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, October 14-15, 2020. USENIX Association 2020, ISBN 978-1-939133-18-2 [contents] - [i1]Platon Kotzias, Juan Caballero, Leyla Bilge:
How Did That Get In My Phone? Unwanted App Distribution on Android Devices. CoRR abs/2010.10088 (2020)
2010 – 2019
- 2019
- [c21]Iskander Sánchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos:
Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control. AsiaCCS 2019: 340-351 - [c20]Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero:
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises. NDSS 2019 - 2018
- [c19]Yanko Baychev, Leyla Bilge:
Spearphishing Malware: Do We Really Know the Unknown? DIMVA 2018: 46-66 - 2017
- [c18]Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier:
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. ACSAC 2017: 449-460 - [c17]Leyla Bilge, Yufei Han, Matteo Dell'Amico:
RiskTeller: Predicting the Risk of Cyber Incidents. CCS 2017: 1299-1311 - 2016
- [c16]Platon Kotzias, Leyla Bilge, Juan Caballero:
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services. USENIX Security Symposium 2016: 739-756 - 2015
- [c15]Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras:
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics. CCS 2015: 1118-1129 - [c14]Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda:
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. DIMVA 2015: 3-24 - [c13]Olivier Thonnard, Leyla Bilge, Anand Kashyap, Martin Lee:
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks. Financial Cryptography 2015: 13-31 - [c12]Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras:
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. IEEE Symposium on Security and Privacy 2015: 692-708 - [c11]Mariano Graziano, Davide Canali, Leyla Bilge, Andrea Lanzi, Davide Balzarotti:
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence. USENIX Security Symposium 2015: 1057-1072 - 2014
- [j2]Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14 (2014) - [c10]Davide Canali, Leyla Bilge, Davide Balzarotti:
On the effectiveness of risk prediction based on users browsing behavior. AsiaCCS 2014: 171-182 - 2013
- [j1]Leyla Bilge, Tudor Dumitras:
Investigating Zero-Day Attacks. login Usenix Mag. 38(4) (2013) - 2012
- [c9]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c8]Leyla Bilge, Tudor Dumitras:
Before we knew it: an empirical study of zero-day attacks in the real world. CCS 2012: 833-844 - [c7]Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee:
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. RAID 2012: 64-85 - 2011
- [c6]Leyla Bilge, Andrea Lanzi, Davide Balzarotti:
Thwarting real-time dynamic unpacking. EUROSEC 2011: 5 - [c5]Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS 2011 - 2010
- [c4]Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
G-Free: defeating return-oriented programming through gadget-less binaries. ACSAC 2010: 49-58 - [c3]Manuel Egele, Leyla Bilge, Engin Kirda, Christopher Kruegel:
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. SAC 2010: 1865-1870
2000 – 2009
- 2009
- [c2]Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda:
Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249 - [c1]Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda:
All your contacts are belong to us: automated identity theft attacks on social networks. WWW 2009: 551-560
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint