User profiles for Yacin Nadji

Yacin Nadji

Corelight, Inc
Verified email at gatech.edu
Cited by 1896

From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware

M Antonakakis, R Perdisci, Y Nadji… - 21st USENIX Security …, 2012 - usenix.org
Many botnet detection systems employ a blacklist of known command and control (C&C)
domains to detect bots and block their traffic. Similar to signature-based virus detection, such a …

[PDF][PDF] Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.

Y Nadji, P Saxena, D Song - NDSS, 2009 - webblaze.cs.berkeley.edu
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in
2007. The main underlying reason for XSS vulnerabilities is that web markup and client-side …

Practical attacks against graph-based clustering

Y Chen, Y Nadji, A Kountouras, F Monrose… - Proceedings of the …, 2017 - dl.acm.org
Graph modeling allows numerous security problems to be tackled in a general way, however,
little work has been done to understand their ability to withstand adversarial attacks. We …

Domain-z: 28 registrations later measuring the exploitation of residual trust in domains

C Lever, R Walls, Y Nadji, D Dagon… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Any individual that re-registers an expired domain implicitly inherits the residual trust
associated with the domain's prior use. We find that adversaries can, and do, use malicious re-…

Beheading hydras: performing effective botnet takedowns

Y Nadji, M Antonakakis, R Perdisci, D Dagon… - Proceedings of the 2013 …, 2013 - dl.acm.org
Devices infected with malicious software typically form botnet armies under the influence of
one or more command and control (C&C) servers. The botnet problem reached such levels …

Enabling network security through active DNS datasets

…, P Kintis, C Lever, Y Chen, Y Nadji… - Research in Attacks …, 2016 - Springer
Most modern cyber crime leverages the Domain Name System (DNS) to attain high levels of
network agility and make detection of Internet abuse challenging. The majority of malware, …

DNS noise: Measuring the pervasiveness of disposable domains in modern DNS traffic

…, M Antonakakis, R Perdisci, Y Nadji… - 2014 44th Annual …, 2014 - ieeexplore.ieee.org
In this paper, we present an analysis of a new class of domain names: disposable domains.
We observe that popular web applications, along with other Internet services, systematically …

Automated remote repair for mobile malware

Y Nadji, J Giffin, P Traynor - Proceedings of the 27th Annual Computer …, 2011 - dl.acm.org
Mobile application markets currently serve as the main line of defense against malicious
applications. While marketplace revocations have successfully removed the few overtly …

Just awful enough: the functional dysfunction of the something awful forums

JA Pater, Y Nadji, ED Mynatt… - Proceedings of the SIGCHI …, 2014 - dl.acm.org
The Something Awful Forums (SAF) is an online community comprised of a loosely connected
federation of forums, united in a distinctive brand of humor with a focus on the quality of …

Connected colors: Unveiling the structure of criminal networks

Y Nadji, M Antonakakis, R Perdisci, W Lee - … Bay, St. Lucia, October 23-25 …, 2013 - Springer
In this paper we study the structure of criminal networks, groups of related malicious infrastructures
that work in concert to provide hosting for criminal activities. We develop a method to …