The Circle of life: A {large-scale} study of the {IoT} malware lifecycle O Alrawi, C Lever, K Valakuzhy, K Snow, F Monrose, M Antonakakis 30th USENIX Security Symposium (USENIX Security 21), 3505-3522, 2021 | 84 | 2021 |
Determining the number of clusters via iterative consensus clustering C Meyer, S Race, K Valakuzhy Proceedings of the 2013 SIAM International Conference on Data Mining, 94-102, 2013 | 37 | 2013 |
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators A Avgetidis, O Alrawi, K Valakuzhy, C Lever, P Burbage, AD Keromytis, ... 32nd USENIX security symposium (USENIX Security 23), 5307-5324, 2023 | 4 | 2023 |
R. Court, K. Snow, F. Monrose, and M. Antonakakis,“The circle of life: A Large-Scale study of the IoT malware lifecycle,” O Alrawi, C Lever, K Valakuzhy 30th USENIX Security Symposium (USENIX Security 21), 3505-3522, 0 | 4 | |
On the Feasibility of Remotely Triggered Automotive Hardware Trojans A Moschos, K Valakuzhy, AD Keromytis 2022 International Conference on Electrical, Computer, Communications and …, 2022 | 1 | 2022 |
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned O Alrawi, MY Wong, A Avgetidis, K Valakuzhy, BV Adjibi, K Karakatsanis, ... arXiv preprint arXiv:2403.16304, 2024 | | 2024 |
Iterated Consensus Clustering: A Technique We Can All Agree On M Hong, R Pearce, K Valakuzhy, C Meyer, S Race Algorithms 5, 1, 0 | | |