Brandon Enright

ORCID: 0009-0006-0239-2257
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Internet Traffic Analysis and Secure E-voting
  • Cybercrime and Law Enforcement Studies
  • Peer-to-Peer Network Technologies
  • Electrostatic Discharge in Electronics
  • Advanced Data Storage Technologies
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Complex Network Analysis Techniques
  • Information and Cyber Security
  • Scientific Computing and Data Management
  • Security and Verification in Computing

Cisco Systems (United States)
2023

University of California, San Diego
2008-2009

UC San Diego Health System
2008

The conversion rate of spam--the probability that an unsolicited e-mail will ultimately elicit a sale--underlies the entire spam value proposition. However, our understanding this critical behavior is quite limited, and literature lacks any quantitative study concerning its true value. In paper we present methodology for measuring spam. Using parasitic infiltration existing botnet's infrastructure, analyze two campaigns: one designed to propagate malware Trojan, other marketing on-line...

10.1145/1455770.1455774 article EN 2008-10-27

We report on the aftermath of discovery a severe vulnerability in Debian Linux version OpenSSL. Systems affected by bug generated predictable random numbers, most importantly public/private keypairs. To study user response to this vulnerability, we collected novel dataset daily remote scans over 50,000 SSL/TLS-enabled Web servers, which 751 displayed vulnerable certificates. three primary results. First, as expected from previous work, find an extremely slow rate fixing, with 30% hosts when...

10.1145/1644893.1644896 article EN 2009-11-04

Spam-based marketing is a curious beast. We all receive the advertisements---"Excellent hardness easy!"---but few of us have encountered person who admits to following through on this offer and making purchase. And yet, relentlessness by which such spam continually clogs Internet inboxes, despite years energetic deployment antispam technology, provides undeniable testament that spammers find their campaigns profitable. Someone clearly buying. But how many, often, much? Unraveling questions...

10.1145/1562164.1562190 article EN Communications of the ACM 2009-08-25

Weak entropy is an industry-wide challenge for network device vendors. We conducted a large scale analysis of RSA keys in about 226 million certificates from one vendor, covering products that were manufactured over 12-year time period. By focusing on specific data features the manufacturing certificates, we tested common and factors across distinct devices. The our enabled detection failures manifested millions affected devices included several not implicated any prior studies, resulting...

10.1145/3627106.3627120 article EN Annual Computer Security Applications Conference 2023-12-02
Coming Soon ...