default search action
Manos Antonakakis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c48]Tillson Galloway, Kleanthis Karakolios, Zane Ma, Roberto Perdisci, Angelos Keromytis, Manos Antonakakis:
Practical Attacks Against DNS Reputation Systems. SP 2024: 4516-4534 - [c47]Karthika Subramani, Roberto Perdisci, Pierros-Christos Skafidas, Manos Antonakakis:
Discovering and Measuring CDNs Prone to Domain Fronting. WWW 2024: 1859-1867 - [i5]Omar Alrawi, Miuyin Yong Wong, Athanasios Avgetidis, Kevin Valakuzhy, Boladji Vinny Adjibi, Konstantinos Karakatsanis, Mustaque Ahamad, Douglas M. Blough, Fabian Monrose, Manos Antonakakis:
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned. CoRR abs/2403.16304 (2024) - 2023
- [c46]Yufei Du, Omar Alrawi, Kevin Z. Snow, Manos Antonakakis, Fabian Monrose:
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level. CCS 2023: 2695-2709 - [c45]Zane Ma, Aaron Faulkenberry, Thomas Papastergiou, Zakir Durumeric, Michael D. Bailey, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys. IMC 2023: 222-235 - [c44]Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators. USENIX Security Symposium 2023: 5307-5324 - 2022
- [c43]Aaron Faulkenberry, Athanasios Avgetidis, Zane Ma, Omar Alrawi, Charles Lever, Panagiotis Kintis, Fabian Monrose, Angelos D. Keromytis, Manos Antonakakis:
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy. ACSAC 2022: 240-250 - [c42]Thomas Papastergiou, Roberto Perdisci, Manos Antonakakis:
Returning to Port: Efficient Detection of Home Router Devices. CNS 2022: 172-180 - 2021
- [c41]Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Elissa M. Redmiles, Mustaque Ahamad:
An Inside Look into the Practice of Malware Analysis. CCS 2021: 3053-3069 - [c40]Athanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, Charles Lever, Michalis Polychronakis, Manos Antonakakis:
Understanding the Growth and Security Considerations of ECS. NDSS 2021 - [c39]Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Z. Snow, Fabian Monrose, Manos Antonakakis:
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. USENIX Security Symposium 2021: 3505-3522 - [c38]Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael D. Bailey:
What's in a Name? Exploring CA Certificate Control. USENIX Security Symposium 2021: 4383-4400 - 2020
- [c37]Sanjeev Das, Kedrian James, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs. ACSAC 2020: 345-359 - [c36]Roberto Perdisci, Thomas Papastergiou, Omar Alrawi, Manos Antonakakis:
IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis. EuroS&P 2020: 474-489
2010 – 2019
- 2019
- [c35]Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves. AsiaCCS 2019: 73-85 - [c34]Sanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security. IEEE Symposium on Security and Privacy 2019: 20-38 - [c33]Omar Alrawi, Chaz Lever, Manos Antonakakis, Fabian Monrose:
SoK: Security Evaluation of Home-Based IoT Deployments. IEEE Symposium on Security and Privacy 2019: 1362-1380 - [c32]Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov, Manos Antonakakis, Michael D. Bailey:
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild. WWW 2019: 840-852 - 2018
- [c31]Micah Morton, Jan Werner, Panagiotis Kintis, Kevin Z. Snow, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks. EuroS&P 2018: 167-182 - [c30]Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis:
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance. Internet Measurement Conference 2018: 379-392 - [c29]Bharat Srinivasan, Athanasios Kountouras, Najmeh Miramirkhani, Monjur Alam, Nick Nikiforakis, Manos Antonakakis, Mustaque Ahamad:
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers. WWW 2018: 319-328 - [i4]Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis:
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance. CoRR abs/1809.09086 (2018) - 2017
- [j5]Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Michael Farrell:
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet. Comput. Secur. 67: 164-180 (2017) - [j4]Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis:
Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains. IEEE Secur. Priv. 15(2): 70-77 (2017) - [j3]Yacin Nadji, Roberto Perdisci, Manos Antonakakis:
Still Beheading Hydras: Botnet Takedowns Then and Now. IEEE Trans. Dependable Secur. Comput. 14(5): 535-549 (2017) - [c28]Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis:
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. CCS 2017: 569-586 - [c27]Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CCS 2017: 1125-1142 - [c26]Yizheng Chen, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon:
Measuring Network Reputation in the Ad-Bidding Process. DIMVA 2017: 388-409 - [c25]Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis:
A Lustrum of Malware Network Communication: Evolution and Insights. IEEE Symposium on Security and Privacy 2017: 788-804 - [c24]Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - [c23]Rosa Romero Gómez, Yacin Nadji, Manos Antonakakis:
Towards designing effective visualizations for DNS-based network threat analysis. VizSEC 2017: 1-8 - [e1]Marc Dacier, Michael D. Bailey, Michalis Polychronakis, Manos Antonakakis:
Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings. Lecture Notes in Computer Science 10453, Springer 2017, ISBN 978-3-319-66331-9 [contents] - [i3]Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis:
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. CoRR abs/1708.08519 (2017) - [i2]Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CoRR abs/1708.09056 (2017) - [i1]Bharat Srinivasan, Athanasios Kountouras, Najmeh Miramirkhani, Monjur Alam, Nick Nikiforakis, Manos Antonakakis, Mustaque Ahamad:
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers. CoRR abs/1709.08331 (2017) - 2016
- [j2]Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis:
Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks. ACM Trans. Priv. Secur. 19(2): 4:1-4:31 (2016) - [c22]Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell:
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. DIMVA 2016: 231-254 - [c21]Panagiotis Kintis, Yacin Nadji, David Dagon, Michael Farrell, Manos Antonakakis:
Understanding the Privacy Implications of ECS - (Extended Abstract). DIMVA 2016: 343-353 - [c20]Bharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad:
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution. ESORICS (1) 2016: 3-26 - [c19]Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon, Manos Antonakakis, Rodney Joffe:
Enabling Network Security Through Active DNS Datasets. RAID 2016: 188-208 - [c18]Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis:
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains. IEEE Symposium on Security and Privacy 2016: 691-706 - [c17]Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad:
Towards Measuring and Mitigating Social Engineering Software Download Attacks. USENIX Security Symposium 2016: 773-789 - 2015
- [c16]Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis:
Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks. DSN 2015: 403-414 - [c15]Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad:
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths. USENIX Security Symposium 2015: 1025-1040 - 2014
- [c14]Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee:
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic. DSN 2014: 598-609 - 2013
- [c13]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee:
Beheading hydras: performing effective botnet takedowns. CCS 2013: 121-132 - [c12]Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis:
Measuring and Detecting Malware Downloads in Live Network Traffic. ESORICS 2013: 556-573 - [c11]Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon:
SinkMiner: Mining Botnet Sinkholes for Fun and Profit. LEET 2013 - [c10]Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee:
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. NDSS 2013 - [c9]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Connected Colors: Unveiling the Structure of Criminal Networks. RAID 2013: 390-410 - 2012
- [j1]Manos Antonakakis, Roberto Perdisci, Nikolaos Vasiloglou, Wenke Lee:
Detecting and Tracking the Rise of DGA-Based Malware. login Usenix Mag. 37(6) (2012) - [c8]Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon:
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. USENIX Security Symposium 2012: 491-506 - 2011
- [c7]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Understanding the prevalence and use of alternative plans in malware with network games. ACSAC 2011: 1-10 - [c6]Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, David Dagon:
Detecting Malware Domains at the Upper DNS Hierarchy. USENIX Security Symposium 2011 - 2010
- [c5]Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor:
A Centralized Monitoring Infrastructure for Improving DNS Security. RAID 2010: 18-37 - [c4]Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster:
Building a Dynamic Reputation System for DNS. USENIX Security Symposium 2010: 273-290
2000 – 2009
- 2009
- [c3]Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee:
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. DSN 2009: 3-12 - [c2]David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee:
Recursive DNS Architectures and Vulnerability Implications. NDSS 2009 - 2008
- [c1]David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee:
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. CCS 2008: 211-222
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 23:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint