Follow
Leyla Bilge
Leyla Bilge
Other namesLeylya Yumer
NortonLifeLock Research Group
No verified email
Title
Cited by
Cited by
Year
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
L Bilge, E Kirda, C Kruegel, M Balduzzi
Ndss, 1-17, 2011
9162011
Before we knew it: an empirical study of zero-day attacks in the real world
L Bilge, T Dumitraş
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
8892012
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
8232009
Cutting the gordian knot: A look under the hood of ransomware attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
6152015
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
4072012
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014
3962014
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th annual computer security applications conference, 49-58, 2010
3842010
Automatically generating models for botnet detection
P Wurzinger, L Bilge, T Holz, J Goebel, C Kruegel, E Kirda
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
2752009
Can I opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
2582019
Systems and methods for evaluating network security
L Yumer
US Patent 9,800,606, 2017
2272017
The attack of the clones: A study of the impact of shared code on vulnerability patching
A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras
2015 IEEE symposium on security and privacy, 692-708, 2015
1942015
The dropper effect: Insights into malware distribution with downloader graph analytics
BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitraş
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1752015
A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks
DF Sittig, H Singh
Applied clinical informatics 7 (02), 624-632, 2016
1422016
Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat
O Thonnard, L Bilge, G O’Gorman, S Kiernan, M Lee
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
1142012
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1112017
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ...
24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015
992015
Measuring {PUP} Prevalence and {PUP} Distribution through {Pay-Per-Install} Services
P Kotzias, L Bilge, J Caballero
25th USENIX Security Symposium (USENIX Security 16), 739-756, 2016
942016
On the effectiveness of risk prediction based on users browsing behavior
D Canali, L Bilge, D Balzarotti
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
892014
The tangled genealogy of IoT malware
E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti
Proceedings of the 36th Annual Computer Security Applications Conference, 1-16, 2020
802020
Does every second count? time-based evolution of malware behavior in sandboxes
A Küchler, A Mantovani, Y Han, L Bilge, D Balzarotti
NDSS 2021, Network and Distributed Systems Security Symposium, 2021
662021
The system can't perform the operation now. Try again later.
Articles 1–20