Extracting certificates from live traffic: A near real-time SSL notary service B Amann, M Vallentin, S Hall, R Sommer Technical Report TR-12-014, ICSI, 2012 | 50 | 2012 |
No attack necessary: The surprising dynamics of SSL trust relationships J Amann, R Sommer, M Vallentin, S Hall Proceedings of the 29th annual computer security applications conference …, 2013 | 47 | 2013 |
The bro network security monitor V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ... Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2012 | 31 | 2012 |
Revisiting SSL: A large-scale study of the internet’s most trusted protocol B Amann, M Vallentin, S Hall, R Sommer ICSI, Tech. Rep., 2012 | 29 | 2012 |
Spicy: a unified deep packet inspection framework for safely dissecting all your data R Sommer, J Amann, S Hall Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 27* | 2016 |
A lone wolf no more: Supporting network intrusion detection with real-time intelligence J Amann, R Sommer, A Sharma, S Hall Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 26 | 2012 |
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks J Amann, S Hall, R Sommer | 13* | |
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates J Amann, R Sommer, M Vallentin, S Hall Tiny Trans. Comput. Sci. 3, 2015 | | 2015 |