logo EDITE Leyla BILGE
Identité
Leyla BILGE
État académique
Thèse soutenue le 2011-12-15
Sujet: Détection des Botnets par l'analyse du réseau
Direction de thèse:
Laboratoire:
Voisinage
Ellipse bleue: doctorant, ellipse jaune: docteur, rectangle vert: permanent, rectangle jaune: HDR. Trait vert: encadrant de thèse, trait bleu: directeur de thèse, pointillé: jury d'évaluation à mi-parcours ou jury de thèse.
Productions scientifiques
Conference:Balduzzi-06/02/2011
EXPOSURE : Finding malicious domains using passive DNS analysis
EXPOSURE : Finding malicious domains using passive DNS analysis, NDSS'11, 18th Annual Network & Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA 06/02/2011
http://dx.doi.org/10.1007/978-88-470-1818-1_13
A summary of two practical attacks against social networks
A summary of two practical attacks against social networks, ITWDC'11, 21st International Tyrrhenian Workshop on Digital Communications: Trustworthy Internet, September 6-8, 2010, Island of Ponza, Italy / Also published as chapter book 13 of "Trustworthy internet", Springer, ISBN: 978-8847018174 06/09/2010
Thesis:Bilge-15/12/2011
Network-based botnet detection
Network-based botnet detection 15/12/2011
http://dx.doi.org/10.1145/1972551.1972556
Thwarting real-time dynamic unpacking
Thwarting real-time dynamic unpacking, EUROSEC 2011, 4th ACM European Workshop on System Security, April 10th, 2011, Salzburg, Austria 10/04/2011
Conference:Bilge-06/02/2011
EXPOSURE : Finding malicious domains using passive DNS analysis
EXPOSURE : Finding malicious domains using passive DNS analysis, NDSS'11, 18th Annual Network & Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA 06/02/2011
http://dx.doi.org/10.1145/1920261.1920269
G-Free : defeating return-oriented programming through gadget-less binaries
G-Free : defeating return-oriented programming through gadget-less binaries, ACSAC'10, Annual Computer Security Applications Conference, December 6-10, 2010, Austin, Texas, USA 06/12/2010
http://dx.doi.org/10.1145/1774088.1774483
CAPTCHA smuggling : Hijacking web browsing sessions to create CAPTCHA farms
CAPTCHA smuggling : Hijacking web browsing sessions to create CAPTCHA farms, SAC 2010, 25th ACM Symposium On Applied Computing, March 22-26, 2010, Sierre, Switzerland 22/03/2010
http://dx.doi.org/10.1007/978-3-642-04444-1
Automatically generating models for botnet detection
Automatically generating models for botnet detection, ESORICS 2009, 14th European Symposium on Research in Computer Security, September 21-23, 2009, Saint-Malo, France / Also published as Springer "Lecture Notes in Computer Science", Volume 5789/2009 19/09/2009
http://dx.doi.org/10.1145/1526709.1526784
All your contacts are belong to us : automated identity theft attacks on social networks
All your contacts are belong to us : automated identity theft attacks on social networks, WWW'09, 18th International World Wide Web Conference, April 20-24, Madrid, Spain 20/04/2009
Soutenance
Thèse: Détection des Botnets par l'analyse du réseau
Soutenance: 2011-12-15