Seth Hall
Seth Hall
Research Engineer, International Computer Science Institute
Verified email at - Homepage
Cited by
Cited by
Extracting certificates from live traffic: A near real-time SSL notary service
B Amann, M Vallentin, S Hall, R Sommer
Technical Report TR-12-014, ICSI, 2012
No attack necessary: The surprising dynamics of SSL trust relationships
J Amann, R Sommer, M Vallentin, S Hall
Proceedings of the 29th annual computer security applications conference …, 2013
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2012
Revisiting SSL: A large-scale study of the internet’s most trusted protocol
B Amann, M Vallentin, S Hall, R Sommer
ICSI, Tech. Rep., 2012
Spicy: a unified deep packet inspection framework for safely dissecting all your data
R Sommer, J Amann, S Hall
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
A lone wolf no more: Supporting network intrusion detection with real-time intelligence
J Amann, R Sommer, A Sharma, S Hall
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks
J Amann, S Hall, R Sommer
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates
J Amann, R Sommer, M Vallentin, S Hall
Tiny Trans. Comput. Sci. 3, 2015
The system can't perform the operation now. Try again later.
Articles 1–8