Leyla Bilge
Leyla Bilge
NortonLifeLock Research Group
Verified email at symantec.com
Cited by
Cited by
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
Before we knew it: an empirical study of zero-day attacks in the real world
L Bilge, T Dumitraş
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Cutting the gordian knot: A look under the hood of ransomware attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
International Conference on Detection of Intrusions and Malware, and …, 2015
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th Annual Computer Security Applications Conference, 49-58, 2010
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014
Automatically generating models for botnet detection
P Wurzinger, L Bilge, T Holz, J Goebel, C Kruegel, E Kirda
European symposium on research in computer security, 232-249, 2009
The attack of the clones: A study of the impact of shared code on vulnerability patching
A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras
2015 IEEE symposium on security and privacy, 692-708, 2015
The dropper effect: Insights into malware distribution with downloader graph analytics
BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitraş
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat
O Thonnard, L Bilge, G O’Gorman, S Kiernan, M Lee
International workshop on recent advances in intrusion detection, 64-85, 2012
Systems and methods for evaluating network security
L Yumer
US Patent 9,800,606, 2017
Can i opt out yet? gdpr and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 1057-1072, 2015
Measuring {PUP} prevalence and {PUP} distribution through pay-per-install services
P Kotzias, L Bilge, J Caballero
25th {USENIX} Security Symposium ({USENIX} Security 16), 739-756, 2016
On the effectiveness of risk prediction based on users browsing behavior
D Canali, L Bilge, D Balzarotti
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
CAPTCHA smuggling: Hijacking web browsing sessions to create captcha farms
M Egele, L Bilge, E Kirda, C Kruegel
Proceedings of the 2010 ACM Symposium on Applied Computing, 1865-1870, 2010
Are you at risk? Profiling organizations and individuals subject to targeted attacks
O Thonnard, L Bilge, A Kashyap, M Lee
International Conference on Financial Cryptography and Data Security, 13-31, 2015
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
P Kotzias, L Bilge, PA Vervier, J Caballero
NDSS, 2019
The system can't perform the operation now. Try again later.
Articles 1–20