Conducting cybersecurity research legally and ethically

  • Authors:
  • Aaron J. Burstein

  • Affiliations:
  • University of California, Berkeley, School of Law

  • Venue:
  • LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
  • Year:
  • 2008

Quantified Score

Hi-index 0.01

Visualization

Abstract

We develop new techniques to map botnet membership using traces of spam email. To group bots into botnets we look for multiple bots participating in the same spam email campaign. We have applied our technique against a trace of spam email from Hotmail ...