The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware M Vallentin, R Sommer, J Lee, C Leres, V Paxson, B Tierney International Workshop on Recent Advances in Intrusion Detection, 107-126, 2007 | 194 | 2007 |
Here's my cert, so trust me, maybe? Understanding TLS errors on the web D Akhawe, B Amann, M Vallentin, R Sommer Proceedings of the 22nd international conference on World Wide Web, 59-70, 2013 | 109 | 2013 |
Extracting certificates from live traffic: A near real-time SSL notary service B Amann, M Vallentin, S Hall, R Sommer Technical Report TR-12-014, ICSI, 2012 | 45 | 2012 |
No attack necessary: The surprising dynamics of SSL trust relationships B Amann, R Sommer, M Vallentin, S Hall Proceedings of the 29th annual computer security applications conference …, 2013 | 41 | 2013 |
JaldiMAC: taking the distance further Y Ben-David, M Vallentin, S Fowler, E Brewer Proceedings of the 4th ACM workshop on networked systems for developing …, 2010 | 36 | 2010 |
An assessment of overt malicious activity manifest in residential networks G Maier, A Feldmann, V Paxson, R Sommer, M Vallentin International Conference on Detection of Intrusions and Malware, and …, 2011 | 32 | 2011 |
Computing security in the developing world: A case for multidisciplinary research Y Ben-David, S Hasan, J Pal, M Vallentin, S Panjwani, P Gutheim, J Chen, ... Proceedings of the 5th ACM workshop on Networked systems for developing …, 2011 | 30 | 2011 |
{VAST}: A Unified Platform for Interactive Network Forensics M Vallentin, V Paxson, R Sommer 13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016 | 29 | 2016 |
Revisiting SSL: A large-scale study of the internet’s most trusted protocol B Amann, M Vallentin, S Hall, R Sommer ICSI, Tech. Rep., 2012 | 28 | 2012 |
The bro network security monitor V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ... 2015-12-20]. https:∥ www. bro. org, 2012 | 27 | 2012 |
Hilti: An abstract execution environment for deep, stateful network traffic analysis R Sommer, M Vallentin, L De Carli, V Paxson Proceedings of the 2014 Conference on Internet Measurement Conference, 461-474, 2014 | 25 | 2014 |
Native actors: how to scale network forensics M Vallentin, D Charousset, TC Schmidt, V Paxson, M Wählisch Proceedings of the 2014 ACM conference on SIGCOMM, 141-142, 2014 | 8 | 2014 |
Persistent browser cache poisoning M Vallentin, Y Ben-David 2010)[2017-07-20]. https://people. eecs. berkeley. edu/~ yahel/papers …, 2010 | 6 | 2010 |
Scalable Network Forensics M Vallentin UC Berkeley, 2016 | 2 | 2016 |
Quantifying persistent browser cache poisoning M Vallentin, Y Ben-David 2010-04-21)[2017-07-04]. http://matthias. vallentin. net/course-work/cs294 …, 2014 | 2 | 2014 |
The Gh0st in the Shell: Network Security in the Himalayas M Vallentin, J Whiteaker, Y Ben-David UC Berkeley, http://cs. berkeley. edu/~ mavam/cw/cs294-28-paper. pdf …, 2009 | 2 | 2009 |
HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis R Sommer, LD CARLI, N Kothari, M Vallentin, V Paxson Tech. Rep. TR-12-003, ICSI, 2012 | 1 | 2012 |
To Trust, or not to Trust, that is the Question: Structural Properties of X. 509 Certificates J Amann, R Sommer, M Vallentin, S Hall TinyToCS 3, 2015 | | 2015 |
VAST: Visibility Across Space and Time M Vallentin, H Sharma | | 2014 |
Model Selection for Bias Correction in RNA-Seq A Roberts, H Pimentel, M Vallentin | | 2010 |