%PDF-1.4
%
1 0 obj <>stream
application/pdfIEEE2017 IEEE Symposium on Security and Privacy (SP);2017; ; ;10.1109/SP.2017.32BulletProofmalicioushostingsub-allocationsUnder the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider NetworksSumayah AlrwaisXiaojing LiaoXianghang MiPeng WangXiaofeng WangFeng QianRaheem BeyahDamon McCoy
2017 IEEE Symposium on Security and Privacy (SP)805 May 201710.1109/SP.2017.32823
endstream
endobj
2 0 obj <>stream
application/pdf2017 IEEE Symposium on Security and Privacy (SP);2017; ; ;10.1109/SP.2017.32Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks
iTextSharp 4.0.7 (based on iText 2.0.7); modified using iText® 7.1.1 ©2000-2018 iText Group NV (AGPL-version)
2017-04-27T18:29:25.000Z2018-12-11T06:22:20.000Z
endstream
endobj
3 0 obj <>stream
Adobe d
$$''$$53335;;;;;;;;;;
%% ## ((%%((22022;;;;;;;;;; @" " ?
3 !1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw 5 !1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ? OQ8[&mha[fQo%͘e`wc+x=O/E}*ݫOrc3"l@'(P_,K]]ϗg]r--H?sYYv}/q ]صgHs~ YԱȁ<~UY|?7kI|>q0 tIGRH=,?2w
21}Ɠx"o쩞5CC#+]Wf=
cM 5i-{g\pfOܦb>ھSx.<jڜv큨(6Yށh陎*_-W>\ ;? 5rs8m!-9>stream
hެy8Tq?)B$*"[V"%0>g}7320}'KKRv~ӽ<ܿ|99=iO,<O^6i6L@֡a U;0hѿZï$?-)L hQ*MI%*@9KUeHV/t4-:qضJ-@jʖ%rd$' _W|o岁S\hҕp^&ɖJI:C#,
._18MLr-z~( PS$5]RW[gWU.KF55/"^Xe[:zE7Qp[i{Ŏѝ;wGM{Nolv<ڂb)?n5n[Cg9?qqA'.:\}w0t
;C8;7݅3A!ЖwÞX31>"߈nR%I22<uw~tЃµ[ ZR%R@ͥI"Idpn =HQB%xXҝ(-bf#rsO(V*rxa4hŘ t}}>qRSmogn=nO;>>&|˪/3_%\q'Woo(kW-_XPi5ӥxVͩZWl_eFkuuhU_gz#7o|cۆ
mѹeWaQn$gO^iƾ|39C5pVk
8CF#GGЎ'3Et25-],n8sӧsC>;?ya*h!.
WBğ_Q?]qOMN w$קBbN@qpt qZL[:y{RGt˓1n-J},6it@|Mr>&0kmzײfyB/.(I袔⸒KeUxUWVԜu;Qpѭɳ٧ſͰ N-mv;'uO_|åC|dWosa߯3W?~KFD-tr++!+a`:P]Qpp&[m=otwڥ#&m{jf'!--xX9Z=v!-;cG;|֩¹%5Ս}NzR3Y9/ُO
2γ.px"w!#4rVXvJn