Publications

(2023). How to Operate a Meta-Telescope in your Spare Time. In ACM Internet Measurement Conference.

Cite

(2023). SIP Bruteforcing in the Wild - An Assessment of Adversaries, Techniques and Tools. In IFIP Networking Conference.

Cite

(2023). Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms. In IEEE Symposium on Security and Privacy.

Cite

(2021). Scan, test, execute: Adversarial tactics in amplification DDoS attacks. In ACM SIGSAC Conference on Computer and Communications Security.

Cite DOI

(2021). Analysis and takeover of the bitcoin-coordinated pony malware. In ACM Asia Conference on Computer and Communications Security.

Cite

(2020). Examining mirai's battle over the internet of things. In ACM SIGSAC Conference on Computer and Communications Security.

Cite

(2020). Quality evaluation of cyber threat intelligence feeds. In Applied Cryptography and Network Security.

Cite

(2020). Quantifying autonomous system ip churn using attack traffic of botnets. In International Conference on Availability, Reliability and Security.

Cite

(2020). A different cup of TI? the added value of commercial threat intelligence. In USENIX security symposium.

Cite

(2020). Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services. In IFIP Networking Conference.

Cite

(2020). Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services. In IEEE/IFIP Network Operations and Management Symposium.

Cite DOI

(2019). Fingerprinting tooling used for SSH compromisation attempts. In International Symposium on Research in Attacks, Intrusions and Defenses.

Cite

(2019). Taxonomy and adversarial strategies of random subdomain attacks. In IFIP International Conference on New Technologies, Mobility and Security.

Cite