Matthias Vallentin
Matthias Vallentin
Verified email at - Homepage
Cited by
Cited by
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
M Vallentin, R Sommer, J Lee, C Leres, V Paxson, B Tierney
International Workshop on Recent Advances in Intrusion Detection, 107-126, 2007
Here's my cert, so trust me, maybe? Understanding TLS errors on the web
D Akhawe, B Amann, M Vallentin, R Sommer
Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013
Extracting certificates from live traffic: A near real-time SSL notary service
B Amann, M Vallentin, S Hall, R Sommer
Technical Report TR-12-014, ICSI, 2012
No attack necessary: The surprising dynamics of SSL trust relationships
B Amann, R Sommer, M Vallentin, S Hall
Proceedings of the 29th annual computer security applications conference …, 2013
JaldiMAC: taking the distance further
Y Ben-David, M Vallentin, S Fowler, E Brewer
Proceedings of the 4th ACM workshop on networked systems for developing …, 2010
An assessment of overt malicious activity manifest in residential networks
G Maier, A Feldmann, V Paxson, R Sommer, M Vallentin
International Conference on Detection of Intrusions and Malware, and …, 2011
Computing security in the developing world: A case for multidisciplinary research
Y Ben-David, S Hasan, J Pal, M Vallentin, S Panjwani, P Gutheim, J Chen, ...
Proceedings of the 5th ACM workshop on Networked systems for developing …, 2011
{VAST}: A Unified Platform for Interactive Network Forensics
M Vallentin, V Paxson, R Sommer
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
Revisiting SSL: A large-scale study of the internet’s most trusted protocol
B Amann, M Vallentin, S Hall, R Sommer
ICSI, Tech. Rep., 2012
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
2015-12-20]. https:∥ www. bro. org, 2012
Hilti: An abstract execution environment for deep, stateful network traffic analysis
R Sommer, M Vallentin, L De Carli, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 461-474, 2014
Native actors: how to scale network forensics
M Vallentin, D Charousset, TC Schmidt, V Paxson, M Wählisch
Proceedings of the 2014 ACM conference on SIGCOMM, 141-142, 2014
Persistent browser cache poisoning
M Vallentin, Y Ben-David
2010)[2017-07-20]. https://people. eecs. berkeley. edu/~ yahel/papers …, 2010
Scalable Network Forensics
M Vallentin
UC Berkeley, 2016
Quantifying persistent browser cache poisoning
M Vallentin, Y Ben-David
2010-04-21)[2017-07-04]. http://matthias. vallentin. net/course-work/cs294 …, 2014
The Gh0st in the Shell: Network Security in the Himalayas
M Vallentin, J Whiteaker, Y Ben-David
UC Berkeley, http://cs. berkeley. edu/~ mavam/cw/cs294-28-paper. pdf …, 2009
HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis
R Sommer, LD CARLI, N Kothari, M Vallentin, V Paxson
Tech. Rep. TR-12-003, ICSI, 2012
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates
J Amann, R Sommer, M Vallentin, S Hall
TinyToCS 3, 2015
VAST: Visibility Across Space and Time
M Vallentin, H Sharma
Model Selection for Bias Correction in RNA-Seq
A Roberts, H Pimentel, M Vallentin
The system can't perform the operation now. Try again later.
Articles 1–20