User profiles for Yacin Nadji
Yacin NadjiCorelight, Inc Verified email at gatech.edu Cited by 1896 |
From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware
Many botnet detection systems employ a blacklist of known command and control (C&C)
domains to detect bots and block their traffic. Similar to signature-based virus detection, such a …
domains to detect bots and block their traffic. Similar to signature-based virus detection, such a …
[PDF][PDF] Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in
2007. The main underlying reason for XSS vulnerabilities is that web markup and client-side …
2007. The main underlying reason for XSS vulnerabilities is that web markup and client-side …
Practical attacks against graph-based clustering
Graph modeling allows numerous security problems to be tackled in a general way, however,
little work has been done to understand their ability to withstand adversarial attacks. We …
little work has been done to understand their ability to withstand adversarial attacks. We …
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
Any individual that re-registers an expired domain implicitly inherits the residual trust
associated with the domain's prior use. We find that adversaries can, and do, use malicious re-…
associated with the domain's prior use. We find that adversaries can, and do, use malicious re-…
Beheading hydras: performing effective botnet takedowns
Devices infected with malicious software typically form botnet armies under the influence of
one or more command and control (C&C) servers. The botnet problem reached such levels …
one or more command and control (C&C) servers. The botnet problem reached such levels …
Enabling network security through active DNS datasets
Most modern cyber crime leverages the Domain Name System (DNS) to attain high levels of
network agility and make detection of Internet abuse challenging. The majority of malware, …
network agility and make detection of Internet abuse challenging. The majority of malware, …
DNS noise: Measuring the pervasiveness of disposable domains in modern DNS traffic
In this paper, we present an analysis of a new class of domain names: disposable domains.
We observe that popular web applications, along with other Internet services, systematically …
We observe that popular web applications, along with other Internet services, systematically …
Automated remote repair for mobile malware
Mobile application markets currently serve as the main line of defense against malicious
applications. While marketplace revocations have successfully removed the few overtly …
applications. While marketplace revocations have successfully removed the few overtly …
Just awful enough: the functional dysfunction of the something awful forums
The Something Awful Forums (SAF) is an online community comprised of a loosely connected
federation of forums, united in a distinctive brand of humor with a focus on the quality of …
federation of forums, united in a distinctive brand of humor with a focus on the quality of …
Connected colors: Unveiling the structure of criminal networks
In this paper we study the structure of criminal networks, groups of related malicious infrastructures
that work in concert to provide hosting for criminal activities. We develop a method to …
that work in concert to provide hosting for criminal activities. We develop a method to …