default search action
Roberto Perdisci
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j14]Roberto Perdisci, Martina Lindorfer, Gianluca Stringhini:
Introduction to the ACSAC'20 Special Issue. DTRAP 3(2): 12:1-12:2 (2022) - 2021
- [j13]Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini:
Introduction to the ACSAC'19 Special Issue - Vol. 2. DTRAP 2(1): 1:1-1:2 (2021) - 2020
- [j12]Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini:
Introduction to the ACSAC'19 Special Issue - Part 1. DTRAP 1(4): 19e:1-19e:3 (2020) - 2017
- [j11]Yacin Nadji, Roberto Perdisci, Manos Antonakakis:
Still Beheading Hydras: Botnet Takedowns Then and Now. IEEE Trans. Dependable Secur. Comput. 14(5): 535-549 (2017) - 2016
- [j10]Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis:
Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks. ACM Trans. Priv. Secur. 19(2): 4:1-4:31 (2016) - 2014
- [j9]Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li:
PeerRush: Mining for unwanted P2P traffic. J. Inf. Secur. Appl. 19(3): 194-208 (2014) - [j8]Junjie Zhang, Roberto Perdisci, Wenke Lee, Xiapu Luo, Unum Sarfraz:
Building a Scalable System for Stealthy P2P-Botnet Detection. IEEE Trans. Inf. Forensics Secur. 9(1): 27-38 (2014) - 2013
- [j7]Roberto Perdisci, Davide Ariu, Giorgio Giacinto:
Scalable fine-grained behavioral clustering of HTTP-based malware. Comput. Networks 57(2): 487-500 (2013) - 2012
- [j6]Roberto Perdisci, Igino Corona, Giorgio Giacinto:
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis. IEEE Trans. Dependable Secur. Comput. 9(5): 714-726 (2012) - [j5]Manos Antonakakis, Roberto Perdisci, Nikolaos Vasiloglou, Wenke Lee:
Detecting and Tracking the Rise of DGA-Based Malware. login Usenix Mag. 37(6) (2012) - 2009
- [j4]Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee:
McPAD: A multiple classifier system for accurate payload-based anomaly detection. Comput. Networks 53(6): 864-881 (2009) - 2008
- [j3]Giorgio Giacinto, Roberto Perdisci, Mauro Del Rio, Fabio Roli:
Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Inf. Fusion 9(1): 69-82 (2008) - [j2]Roberto Perdisci, Andrea Lanzi, Wenke Lee:
Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29(14): 1941-1946 (2008) - 2006
- [j1]Roberto Perdisci, Giorgio Giacinto, Fabio Roli:
Alarm clustering for intrusion detection systems in computer networks. Eng. Appl. Artif. Intell. 19(4): 429-438 (2006)
Conference and Workshop Papers
- 2024
- [c64]Hoang Dai Nguyen, Karthika Subramani, Bhupendra Acharya, Roberto Perdisci, Phani Vadrevu:
C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks. SP 2024: 277-295 - [c63]Tillson Galloway, Kleanthis Karakolios, Zane Ma, Roberto Perdisci, Angelos Keromytis, Manos Antonakakis:
Practical Attacks Against DNS Reputation Systems. SP 2024: 4516-4534 - [c62]Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee:
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web. USENIX Security Symposium 2024 - [c61]Karthika Subramani, Roberto Perdisci, Pierros-Christos Skafidas, Manos Antonakakis:
Discovering and Measuring CDNs Prone to Domain Fronting. WWW 2024: 1859-1867 - 2023
- [c60]Jienan Liu, Pooja Pun, Phani Vadrevu, Roberto Perdisci:
Understanding, Measuring, and Detecting Modern Technical Support Scams. EuroS&P 2023: 18-38 - [c59]Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang:
Combating Robocalls with Phone Virtual Assistant Mediated Interaction. USENIX Security Symposium 2023: 463-479 - [c58]Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee:
TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks. USENIX Security Symposium 2023: 6701-6718 - 2022
- [c57]Thomas Papastergiou, Roberto Perdisci, Manos Antonakakis:
Returning to Port: Efficient Detection of Home Router Devices. CNS 2022: 172-180 - [c56]Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci:
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations. EuroS&P 2022: 555-571 - [c55]Karthika Subramani, William Melicher, Oleksii Starov, Phani Vadrevu, Roberto Perdisci:
PhishInPatterns: measuring elicited user interactions at scale on phishing websites. IMC 2022: 589-604 - 2021
- [c54]Karthika Subramani, Roberto Perdisci, Maria Konte:
Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs. DIMVA 2021: 42-67 - [c53]Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, Roberto Perdisci:
C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis. NDSS 2021 - [c52]Sharbani Pandit, Jienan Liu, Roberto Perdisci, Mustaque Ahamad:
Applying Deep Learning to Combat Mass Robocalls. SP (Workshops) 2021: 63-70 - 2020
- [c51]Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad:
Towards a Practical Differentially Private Collaborative Phone Blacklisting System. ACSAC 2020: 100-115 - [c50]Joey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh Grover, Andrew Chang, Yang Ji, Roberto Perdisci, Wenke Lee:
Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System. CCS 2020: 787-802 - [c49]Roberto Perdisci, Thomas Papastergiou, Omar Alrawi, Manos Antonakakis:
IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis. EuroS&P 2020: 474-489 - [c48]Karthika Subramani, Xingzi Yuan, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:
When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising. Internet Measurement Conference 2020: 724-737 - 2019
- [c47]Phani Vadrevu, Roberto Perdisci:
What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns. Internet Measurement Conference 2019: 308-321 - 2018
- [c46]Jienan Liu, Babak Rahbarinia, Roberto Perdisci, Haitao Du, Li Su:
Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets. AsiaCCS 2018: 273-284 - [c45]Payas Gupta, Roberto Perdisci, Mustaque Ahamad:
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam. AsiaCCS 2018: 285-296 - [c44]Bo Li, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. NDSS 2018 - [c43]Sharbani Pandit, Roberto Perdisci, Mustaque Ahamad, Payas Gupta:
Towards Measuring the Effectiveness of Telephony Blacklists. NDSS 2018 - 2017
- [c42]Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CCS 2017: 1125-1142 - [c41]Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci:
Exploring the Long Tail of (Malicious) Software Downloads. DSN 2017: 391-402 - [c40]Phani Vadrevu, Jienan Liu, Bo Li, Babak Rahbarinia, Kyu Hyung Lee, Roberto Perdisci:
Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots. NDSS 2017 - 2016
- [c39]Phani Vadrevu, Roberto Perdisci:
MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing. AsiaCCS 2016: 771-782 - [c38]Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci:
Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining. AsiaCCS 2016: 783-794 - [c37]Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad:
Towards Measuring and Mitigating Social Engineering Software Download Attacks. USENIX Security Symposium 2016: 773-789 - 2015
- [c36]Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li:
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. CCS 2015: 133-145 - [c35]Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis:
Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks. DSN 2015: 403-414 - [c34]Maria Konte, Roberto Perdisci, Nick Feamster:
ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes. SIGCOMM 2015: 625-638 - [c33]Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad:
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths. USENIX Security Symposium 2015: 1025-1040 - [c32]Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee:
Understanding Malvertising Through Ad-Injecting Browser Extensions. WWW 2015: 1286-1295 - 2014
- [c31]Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms:
ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces. CCS 2014: 1244-1255 - [c30]Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee:
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic. DSN 2014: 598-609 - 2013
- [c29]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee:
Beheading hydras: performing effective botnet takedowns. CCS 2013: 121-132 - [c28]Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li:
PeerRush: Mining for Unwanted P2P Traffic. DIMVA 2013: 62-82 - [c27]Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis:
Measuring and Detecting Malware Downloads in Live Network Traffic. ESORICS 2013: 556-573 - [c26]Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon:
SinkMiner: Mining Botnet Sinkholes for Fun and Profit. LEET 2013 - [c25]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Connected Colors: Unveiling the Structure of Criminal Networks. RAID 2013: 390-410 - [c24]Terry Nelms, Roberto Perdisci, Mustaque Ahamad:
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. USENIX Security Symposium 2013: 589-604 - 2012
- [c23]Roberto Perdisci, Man Chon U:
VAMO: towards a fully automated malware clustering validity analysis. ACSAC 2012: 329-338 - [c22]Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon:
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. USENIX Security Symposium 2012: 491-506 - 2011
- [c21]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Understanding the prevalence and use of alternative plans in malware with network games. ACSAC 2011: 1-10 - [c20]Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang:
Exposing invisible timing-based traffic watermarks with BACKLIT. ACSAC 2011: 197-206 - [c19]Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster:
Boosting the scalability of botnet detection using adaptive traffic sampling. AsiaCCS 2011: 124-134 - [c18]Long Lu, Roberto Perdisci, Wenke Lee:
SURF: detecting and measuring search poisoning. CCS 2011: 467-476 - [c17]Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo:
Detecting stealthy P2P botnets using statistical traffic fingerprints. DSN 2011: 121-132 - [c16]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci:
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. NDSS 2011 - [c15]Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, David Dagon:
Detecting Malware Domains at the Upper DNS Hierarchy. USENIX Security Symposium 2011 - 2010
- [c14]Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee:
On the Secrecy of Spread-Spectrum Flow Watermarks. ESORICS 2010: 232-248 - [c13]Roberto Perdisci, Wenke Lee, Nick Feamster:
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. NSDI 2010: 391-404 - [c12]Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor:
A Centralized Monitoring Infrastructure for Improving DNS Security. RAID 2010: 18-37 - [c11]Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster:
Building a Dynamic Reputation System for DNS. USENIX Security Symposium 2010: 273-290 - 2009
- [c10]Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee:
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. ACSAC 2009: 311-320 - [c9]Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee:
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. DSN 2009: 3-12 - 2008
- [c8]Roberto Perdisci, Andrea Lanzi, Wenke Lee:
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310 - [c7]Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154 - 2007
- [c6]Davide Ariu, Giorgio Giacinto, Roberto Perdisci:
Sensing Attacks in Computers Networks with Hidden Markov Models. MLDM 2007: 449-463 - 2006
- [c5]Roberto Perdisci, Guofei Gu, Wenke Lee:
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498 - [c4]Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul Islam Sharif:
MisleadingWorm Signature Generators Using Deliberate Noise Injection. S&P 2006: 17-31 - [c3]Prahlad Fogla, Monirul Islam Sharif, Roberto Perdisci, Oleg M. Kolesnikov, Wenke Lee:
Polymorphic Blending Attacks. USENIX Security Symposium 2006 - 2005
- [c2]Giorgio Giacinto, Roberto Perdisci, Fabio Roli:
Network Intrusion Detection by Combining One-Class Classifiers. ICIAP 2005: 58-65 - [c1]Giorgio Giacinto, Roberto Perdisci, Fabio Roli:
Alarm Clustering for Intrusion Detection Systems in Computer Networks. MLDM 2005: 184-193
Editorship
- 2019
- [e1]Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren:
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Lecture Notes in Computer Science 11543, Springer 2019, ISBN 978-3-030-22037-2 [contents]
Informal and Other Publications
- 2024
- [i8]Irfan Ozen, Karthika Subramani, Phani Vadrevu, Roberto Perdisci:
SENet: Visual Detection of Online Social Engineering Attack Campaigns. CoRR abs/2401.05569 (2024) - 2023
- [i7]Karthika Subramani, Roberto Perdisci, Pierros Skafidas:
Measuring CDNs susceptible to Domain Fronting. CoRR abs/2310.17851 (2023) - 2021
- [i6]Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci:
Categorizing Service Worker Attacks and Mitigations. CoRR abs/2111.07153 (2021) - 2020
- [i5]Karthika Subramani, Xingzi Yuan, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:
Measuring Abuse in Web Push Advertising. CoRR abs/2002.06448 (2020) - [i4]Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad:
Building a Collaborative Phone Blacklisting System with Local Differential Privacy. CoRR abs/2006.09287 (2020) - [i3]Karthika Subramani, Roberto Perdisci, Maria Konte:
IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points. CoRR abs/2006.12555 (2020) - [i2]Sharbani Pandit, Jienan Liu, Roberto Perdisci, Mustaque Ahamad:
Fighting Voice Spam with a Virtual Assistant Prototype. CoRR abs/2008.03554 (2020) - 2017
- [i1]Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CoRR abs/1708.09056 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint