BibTeX records: Chris Kanich

download as .bib file

@article{DBLP:journals/corr/abs-2403-05638,
  author       = {John Kristoff and
                  Moritz M{\"{u}}ller and
                  Arturo Filast{\`{o}} and
                  Max Resing and
                  Chris Kanich and
                  Niels ten Oever},
  title        = {Internet Sanctions on Russian Media: Actions and Effects},
  journal      = {CoRR},
  volume       = {abs/2403.05638},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.05638},
  doi          = {10.48550/ARXIV.2403.05638},
  eprinttype    = {arXiv},
  eprint       = {2403.05638},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-05638.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalashAKWKA23,
  author       = {David G. Balash and
                  Mir Masood Ali and
                  Monica Kodwani and
                  Xiaoyuan Wu and
                  Chris Kanich and
                  Adam J. Aviv},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's
                  Privacy Label Ecosystem},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3600--3602},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624383},
  doi          = {10.1145/3576915.3624383},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BalashAKWKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/NawrockiKHKSW23,
  author       = {Marcin Nawrocki and
                  John Kristoff and
                  Raphael Hiesgen and
                  Chris Kanich and
                  Thomas C. Schmidt and
                  Matthias W{\"{a}}hlisch},
  title        = {SoK: {A} Data-driven View on Methods to Detect Reflective Amplification
                  DDoS Attacks Using Honeypots},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {576--591},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00041},
  doi          = {10.1109/EUROSP57164.2023.00041},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/NawrockiKHKSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AliCGKNP23,
  author       = {Mir Masood Ali and
                  Binoy Chitale and
                  Mohammad Ghasemisharif and
                  Chris Kanich and
                  Nick Nikiforakis and
                  Jason Polakis},
  title        = {Navigating Murky Waters: Automated Browser Feature Testing for Uncovering
                  Tracking Vectors},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/navigating-murky-waters-automated-browser-feature-testing-for-uncovering-tracking-vectors/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AliCGKNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-04614,
  author       = {Marcin Nawrocki and
                  John Kristoff and
                  Raphael Hiesgen and
                  Chris Kanich and
                  Thomas C. Schmidt and
                  Matthias W{\"{a}}hlisch},
  title        = {SoK: {A} Data-driven View on Methods to Detect Reflective Amplification
                  DDoS Attacks Using Honeypots},
  journal      = {CoRR},
  volume       = {abs/2302.04614},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.04614},
  doi          = {10.48550/ARXIV.2302.04614},
  eprinttype    = {arXiv},
  eprint       = {2302.04614},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-04614.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-17063,
  author       = {Mir Masood Ali and
                  David G. Balash and
                  Chris Kanich and
                  Adam J. Aviv},
  title        = {Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels
                  Compared to Apps' Privacy Policies},
  journal      = {CoRR},
  volume       = {abs/2306.17063},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.17063},
  doi          = {10.48550/ARXIV.2306.17063},
  eprinttype    = {arXiv},
  eprint       = {2306.17063},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-17063.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OhKMP22,
  author       = {ChangSeok Oh and
                  Chris Kanich and
                  Damon McCoy and
                  Paul Pearce},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Cart-ology: Intercepting Targeted Advertising via Ad Network Identity
                  Entanglement},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2401--2414},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560641},
  doi          = {10.1145/3548606.3560641},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OhKMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eaamo/SinghSKK22,
  author       = {Shubham Singh and
                  Bhuvni Shah and
                  Chris Kanich and
                  Ian A. Kash},
  title        = {Fair Decision-Making for Food Inspections},
  booktitle    = {Equity and Access in Algorithms, Mechanisms, and Optimization, {EAAMO}
                  2022, Arlington, VA, USA, October 6-9, 2022},
  pages        = {5:1--5:11},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551624.3555289},
  doi          = {10.1145/3551624.3555289},
  timestamp    = {Wed, 26 Oct 2022 08:54:49 +0200},
  biburl       = {https://dblp.org/rec/conf/eaamo/SinghSKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GhasemisharifKP22,
  author       = {Mohammad Ghasemisharif and
                  Chris Kanich and
                  Jason Polakis},
  title        = {Towards Automated Auditing for Account and Session Management Flaws
                  in Single Sign-On Deployments},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1774--1790},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833753},
  doi          = {10.1109/SP46214.2022.9833753},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GhasemisharifKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-02658,
  author       = {David G. Balash and
                  Mir Masood Ali and
                  Xiaoyuan Wu and
                  Chris Kanich and
                  Adam J. Aviv},
  title        = {Longitudinal Analysis of Privacy Labels in the Apple App Store},
  journal      = {CoRR},
  volume       = {abs/2206.02658},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.02658},
  doi          = {10.48550/ARXIV.2206.02658},
  eprinttype    = {arXiv},
  eprint       = {2206.02658},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-02658.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SolomosKKP21,
  author       = {Konstantinos Solomos and
                  John Kristoff and
                  Chris Kanich and
                  Jason Polakis},
  title        = {Tales of Favicons and Caches: Persistent Tracking in Modern Browsers},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/tales-of-favicons-and-caches-persistent-tracking-in-modern-browsers/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SolomosKKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/KristoffGKP21,
  author       = {John Kristoff and
                  Mohammad Ghasemisharif and
                  Chris Kanich and
                  Jason Polakis},
  editor       = {Oliver Hohlfeld and
                  Andra Lutu and
                  Dave Levin},
  title        = {Plight at the End of the Tunnel - Legacy IPv6 Transition Mechanisms
                  in the Wild},
  booktitle    = {Passive and Active Measurement - 22nd International Conference, {PAM}
                  2021, Virtual Event, March 29 - April 1, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12671},
  pages        = {390--405},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-72582-2\_23},
  doi          = {10.1007/978-3-030-72582-2\_23},
  timestamp    = {Tue, 30 Mar 2021 18:55:05 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/KristoffGKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Khan0SVKUZ21,
  author       = {Mohammad Taha Khan and
                  Christopher Tran and
                  Shubham Singh and
                  Dimitri Vasilkov and
                  Chris Kanich and
                  Blase Ur and
                  Elena Zheleva},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Helping Users Automatically Find and Manage Sensitive, Expendable
                  Files in Cloud Storage},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1145--1162},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/khan-mohammad},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Khan0SVKUZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/TianKPP20,
  author       = {Huixin Tian and
                  Chris Kanich and
                  Jason Polakis and
                  Sameer Patil},
  title        = {Tech Pains: Characterizations of Lived Cybersecurity Experiences},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {250--259},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00040},
  doi          = {10.1109/EUROSPW51379.2020.00040},
  timestamp    = {Thu, 29 Oct 2020 11:34:40 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/TianKPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KristoffBKMPSW20,
  author       = {John Kristoff and
                  Randy Bush and
                  Chris Kanich and
                  George Michaelson and
                  Amreesh Phokeer and
                  Thomas C. Schmidt and
                  Matthias W{\"{a}}hlisch},
  title        = {On Measuring {RPKI} Relying Parties},
  booktitle    = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  October 27-29, 2020},
  pages        = {484--491},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419394.3423622},
  doi          = {10.1145/3419394.3423622},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/KristoffBKMPSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MondalYHKTTKUZ19,
  author       = {Mainack Mondal and
                  G{\"{u}}nce Su Yilmaz and
                  Noah Hirsch and
                  Mohammad Taha Khan and
                  Michael Tang and
                  Christopher Tran and
                  Chris Kanich and
                  Blase Ur and
                  Elena Zheleva},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {991--1008},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354202},
  doi          = {10.1145/3319535.3354202},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MondalYHKTTKUZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/AminiNBYK18,
  author       = {Sara Amini and
                  Vahid Noroozi and
                  Sara Bahaadini and
                  Philip S. Yu and
                  Chris Kanich},
  editor       = {Naoki Abe and
                  Huan Liu and
                  Calton Pu and
                  Xiaohua Hu and
                  Nesreen K. Ahmed and
                  Mu Qiao and
                  Yang Song and
                  Donald Kossmann and
                  Bing Liu and
                  Kisung Lee and
                  Jiliang Tang and
                  Jingrui He and
                  Jeffrey S. Saltz},
  title        = {DeepFP: {A} Deep Learning Framework For User Fingerprinting via Mobile
                  Motion Sensors},
  booktitle    = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
                  Seattle, WA, USA, December 10-13, 2018},
  pages        = {84--91},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BigData.2018.8622372},
  doi          = {10.1109/BIGDATA.2018.8622372},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/AminiNBYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/KhanHKU18,
  author       = {Mohammad Taha Khan and
                  Maria Hyun and
                  Chris Kanich and
                  Blase Ur},
  editor       = {Regan L. Mandryk and
                  Mark Hancock and
                  Mark Perry and
                  Anna L. Cox},
  title        = {Forgotten But Not Gone: Identifying the Need for Longitudinal Data
                  Management in Cloud Storage},
  booktitle    = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018},
  pages        = {543},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3173574.3174117},
  doi          = {10.1145/3173574.3174117},
  timestamp    = {Fri, 12 Mar 2021 15:28:42 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/KhanHKU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HanamsagarWKM18,
  author       = {Ameya Hanamsagar and
                  Simon S. Woo and
                  Chris Kanich and
                  Jelena Mirkovic},
  editor       = {Regan L. Mandryk and
                  Mark Hancock and
                  Mark Perry and
                  Anna L. Cox},
  title        = {Leveraging Semantic Transformation to Investigate Password Habits
                  and Their Causes},
  booktitle    = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018},
  pages        = {570},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3173574.3174144},
  doi          = {10.1145/3173574.3174144},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/HanamsagarWKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/AminiNPGYK18,
  author       = {Sara Amini and
                  Vahid Noroozi and
                  Amit Pande and
                  Satyajit Gupte and
                  Philip S. Yu and
                  Chris Kanich},
  editor       = {Alfredo Cuzzocrea and
                  James Allan and
                  Norman W. Paton and
                  Divesh Srivastava and
                  Rakesh Agrawal and
                  Andrei Z. Broder and
                  Mohammed J. Zaki and
                  K. Sel{\c{c}}uk Candan and
                  Alexandros Labrinidis and
                  Assaf Schuster and
                  Haixun Wang},
  title        = {DeepAuth: {A} Framework for Continuous User Re-authentication in Mobile
                  Apps},
  booktitle    = {Proceedings of the 27th {ACM} International Conference on Information
                  and Knowledge Management, {CIKM} 2018, Torino, Italy, October 22-26,
                  2018},
  pages        = {2027--2035},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3269206.3272034},
  doi          = {10.1145/3269206.3272034},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/AminiNPGYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KhanDVSKV18,
  author       = {Mohammad Taha Khan and
                  Joe DeBlasio and
                  Geoffrey M. Voelker and
                  Alex C. Snoeren and
                  Chris Kanich and
                  Narseo Vallina{-}Rodriguez},
  title        = {An Empirical Analysis of the Commercial {VPN} Ecosystem},
  booktitle    = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
                  Boston, MA, USA, October 31 - November 02, 2018},
  pages        = {443--456},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3278570},
  timestamp    = {Fri, 25 Oct 2019 09:51:49 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/KhanDVSKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TahirRAKZKC18,
  author       = {Rashid Tahir and
                  Ali Raza and
                  Faizan Ahmad and
                  Jehangir Kazi and
                  Fareed Zaffar and
                  Chris Kanich and
                  Matthew Caesar},
  title        = {It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {2618--2626},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486271},
  doi          = {10.1109/INFOCOM.2018.8486271},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/TahirRAKZKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GhasemisharifRC18,
  author       = {Mohammad Ghasemisharif and
                  Amrutha Ramesh and
                  Stephen Checkoway and
                  Chris Kanich and
                  Jason Polakis},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single
                  Sign-On Account Hijacking and Session Management on the Web},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1475--1492},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/ghasemisharif},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GhasemisharifRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Kanich17,
  author       = {Chris Kanich},
  title        = {The costs and benefits of treating the browser like an operating system:
                  how ad blockers help us better understand how different browser features
                  are used and who they benefit},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {47},
  number       = {2},
  pages        = {16--18},
  year         = {2017},
  url          = {https://doi.org/10.1145/3112644.3112647},
  doi          = {10.1145/3112644.3112647},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Kanich17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SnyderTK17,
  author       = {Peter Snyder and
                  Cynthia Bagier Taylor and
                  Chris Kanich},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Most Websites Don't Need to Vibrate: {A} Cost-Benefit Approach to
                  Improving Browser Security},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {179--194},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133966},
  doi          = {10.1145/3133956.3133966},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SnyderTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/AminiK17,
  author       = {Sara Amini and
                  Chris Kanich},
  title        = {Characterizing the impact of malware infections and remediation attempts
                  through support forum analysis},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {70--78},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945056},
  doi          = {10.1109/ECRIME.2017.7945056},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/AminiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/BrugereKB17,
  author       = {Ivan Brugere and
                  Chris Kanich and
                  Tanya Y. Berger{-}Wolf},
  editor       = {Raju Gottumukkala and
                  Xia Ning and
                  Guozhu Dong and
                  Vijay Raghavan and
                  Srinivas Aluru and
                  George Karypis and
                  Lucio Miele and
                  Xindong Wu},
  title        = {Network Model Selection for Task-Focused Attributed Network Inference},
  booktitle    = {2017 {IEEE} International Conference on Data Mining Workshops, {ICDM}
                  Workshops 2017, New Orleans, LA, USA, November 18-21, 2017},
  pages        = {118--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDMW.2017.21},
  doi          = {10.1109/ICDMW.2017.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/BrugereKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SnyderDKM17,
  author       = {Peter Snyder and
                  Periwinkle Doerfler and
                  Chris Kanich and
                  Damon McCoy},
  editor       = {Steve Uhlig and
                  Olaf Maennel},
  title        = {Fifteen minutes of unwanted fame: detecting and characterizing doxing},
  booktitle    = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
                  London, United Kingdom, November 1-3, 2017},
  pages        = {432--444},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131365.3131385},
  doi          = {10.1145/3131365.3131385},
  timestamp    = {Fri, 25 Oct 2019 09:51:18 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/SnyderDKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrugereKB17,
  author       = {Ivan Brugere and
                  Chris Kanich and
                  Tanya Y. Berger{-}Wolf},
  title        = {A General Framework For Task-Oriented Network Inference},
  journal      = {CoRR},
  volume       = {abs/1705.00645},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.00645},
  eprinttype    = {arXiv},
  eprint       = {1705.00645},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrugereKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrugereKB17aa,
  author       = {Ivan Brugere and
                  Chris Kanich and
                  Tanya Y. Berger{-}Wolf},
  title        = {Evaluating Social Networks Using Task-Focused Network Inference},
  journal      = {CoRR},
  volume       = {abs/1707.02385},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.02385},
  eprinttype    = {arXiv},
  eprint       = {1707.02385},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrugereKB17aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-06303,
  author       = {Ivan Brugere and
                  Chris Kanich and
                  Tanya Y. Berger{-}Wolf},
  title        = {Network Model Selection for Task-Focused Attributed Network Inference},
  journal      = {CoRR},
  volume       = {abs/1708.06303},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.06303},
  eprinttype    = {arXiv},
  eprint       = {1708.06303},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-06303.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08510,
  author       = {Peter Snyder and
                  Cynthia Bagier Taylor and
                  Chris Kanich},
  title        = {Most Websites Don't Need to Vibrate: {A} Cost-Benefit Approach to
                  Improving Browser Security},
  journal      = {CoRR},
  volume       = {abs/1708.08510},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.08510},
  eprinttype    = {arXiv},
  eprint       = {1708.08510},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08510.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/SnyderK16,
  author       = {Peter Snyder and
                  Chris Kanich},
  title        = {Characterizing fraud and its ramifications in affiliate marketing
                  networks},
  journal      = {J. Cybersecur.},
  volume       = {2},
  number       = {1},
  pages        = {71--81},
  year         = {2016},
  url          = {https://doi.org/10.1093/cybsec/tyw006},
  doi          = {10.1093/CYBSEC/TYW006},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/SnyderK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SnyderATK16,
  author       = {Peter Snyder and
                  Lara Ansari and
                  Cynthia Bagier Taylor and
                  Chris Kanich},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {Browser Feature Usage on the Modern Web},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {97--110},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987466},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/SnyderATK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SnyderATK16,
  author       = {Peter Snyder and
                  Lara Ansari and
                  Cynthia Bagier Taylor and
                  Chris Kanich},
  title        = {Browser Feature Usage on the Modern Web},
  journal      = {CoRR},
  volume       = {abs/1605.06467},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.06467},
  eprinttype    = {arXiv},
  eprint       = {1605.06467},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/SnyderATK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ClarkSMK15,
  author       = {Jason W. Clark and
                  Peter Snyder and
                  Damon McCoy and
                  Chris Kanich},
  editor       = {Bo Begole and
                  Jinwoo Kim and
                  Kori Inkpen and
                  Woontack Woo},
  title        = {"I Saw Images {I} Didn't Even Know {I} Had": Understanding
                  User Perceptions of Cloud Storage Privacy},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in
                  Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23,
                  2015},
  pages        = {1641--1644},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2702123.2702535},
  doi          = {10.1145/2702123.2702535},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/ClarkSMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SnyderK15,
  author       = {Peter Snyder and
                  Chris Kanich},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {One Thing Leads to Another: Credential Based Privilege Escalation},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {135--137},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699127},
  doi          = {10.1145/2699026.2699127},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/SnyderK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KhanK15,
  author       = {Mohammad Taha Khan and
                  Chris Kanich},
  editor       = {Ben Zevenbergen},
  title        = {High Fidelity, High Risk, High Reward: Using High-Fidelity Networking
                  Data in Ethically Sound Research},
  booktitle    = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Ethics in Networked
                  Systems Research, {NS} Ethics@SIGCOMM 2015, London, United Kingdom,
                  August 21, 2015},
  pages        = {23--26},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2793013.2793024},
  doi          = {10.1145/2793013.2793024},
  timestamp    = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/KhanK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KhanHLK15,
  author       = {Mohammad Taha Khan and
                  Xiang Huo and
                  Zhou Li and
                  Chris Kanich},
  title        = {Every Second Counts: Quantifying the Negative Externalities of Cybercrime
                  via Typosquatting},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {135--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.16},
  doi          = {10.1109/SP.2015.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KhanHLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/SnyderK15,
  author       = {Peter Snyder and
                  Chris Kanich},
  title        = {No Please, After You: Detecting Fraud in Affiliate Marketing Networks},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_snyder.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/SnyderK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/SnyderK14,
  author       = {Peter Snyder and
                  Chris Kanich},
  title        = {Cloudsweeper and data-centric security},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {44},
  number       = {2},
  pages        = {8--10},
  year         = {2014},
  url          = {https://doi.org/10.1145/2656870.2656872},
  doi          = {10.1145/2656870.2656872},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/SnyderK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhagavatulaDKGZ14,
  author       = {Sruti Bhagavatula and
                  Christopher W. Dunn and
                  Chris Kanich and
                  Minaxi Gupta and
                  Brian D. Ziebart},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Leveraging Machine Learning to Improve Unwanted Resource Filtering},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {95--102},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666662},
  doi          = {10.1145/2666652.2666662},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhagavatulaDKGZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SzurdiKCSFK14,
  author       = {Janos Szurdi and
                  Balazs Kocso and
                  Gabor Cseh and
                  Jonathan M. Spring and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Chris Kanich},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {The Long "Taile" of Typosquatting Domain Names},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {191--206},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/szurdi},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SzurdiKCSFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2014cset,
  editor       = {Chris Kanich and
                  Patrick Lardieri},
  title        = {7th Workshop on Cyber Security Experimentation and Test, {CSET} '14,
                  San Diego, CA, USA, August 18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/cset14},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2014cset.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SnyderK13,
  author       = {Peter Snyder and
                  Chris Kanich},
  editor       = {Ari Juels and
                  Bryan Parno},
  title        = {CloudSweeper: enabling data-centric document management for secure
                  cloud archives},
  booktitle    = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop,
                  Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517488.2517495},
  doi          = {10.1145/2517488.2517495},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SnyderK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/GargCK13,
  author       = {Vaibhav Garg and
                  L. Jean Camp and
                  Chris Kanich},
  editor       = {Rainer B{\"{o}}hme},
  title        = {Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk
                  vs. Freelancer},
  booktitle    = {The Economics of Information Security and Privacy},
  pages        = {301--321},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39498-0\_13},
  doi          = {10.1007/978-3-642-39498-0\_13},
  timestamp    = {Tue, 16 May 2017 14:01:33 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/GargCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2013cset,
  editor       = {Chris Kanich and
                  Micah Sherr},
  title        = {6th Workshop on Cyber Security Experimentation and Test, {CSET} '13,
                  Washington, D.C., USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/cset13},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2013cset.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Kanich12,
  author       = {Chris Kanich},
  title        = {Characterizing internet scams through underground infrastructure infiltration},
  school       = {University of California, San Diego, {USA}},
  year         = {2012},
  url          = {https://www.escholarship.org/uc/item/7q22j2fb},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Kanich12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/PitsillidisKVLS12,
  author       = {Andreas Pitsillidis and
                  Chris Kanich and
                  Geoffrey M. Voelker and
                  Kirill Levchenko and
                  Stefan Savage},
  editor       = {John W. Byers and
                  Jim Kurose and
                  Ratul Mahajan and
                  Alex C. Snoeren},
  title        = {Taster's choice: a comparative analysis of spam feeds},
  booktitle    = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  pages        = {427--440},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2398776.2398821},
  doi          = {10.1145/2398776.2398821},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/PitsillidisKVLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/GargKC12,
  author       = {Vaibhav Garg and
                  Chris Kanich and
                  L. Jean Camp},
  title        = {Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk
                  vs. Freelancer},
  booktitle    = {11th Annual Workshop on the Economics of Information Security, {WEIS}
                  2012, Berlin, Germany, 25-26 June, 2012},
  year         = {2012},
  url          = {http://weis2012.econinfosec.org/papers/Garg\_WEIS2012.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/GargKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KreibichWKCP11,
  author       = {Christian Kreibich and
                  Nicholas Weaver and
                  Chris Kanich and
                  Weidong Cui and
                  Vern Paxson},
  editor       = {Patrick Thiran and
                  Walter Willinger},
  title        = {{GQ:} practical containment for measuring modern malware systems},
  booktitle    = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages        = {397--412},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2068816.2068854},
  doi          = {10.1145/2068816.2068854},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/KreibichWKCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11,
  author       = {Kirill Levchenko and
                  Andreas Pitsillidis and
                  Neha Chachra and
                  Brandon Enright and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Chris Grier and
                  Tristan Halvorson and
                  Chris Kanich and
                  Christian Kreibich and
                  He Liu and
                  Damon McCoy and
                  Nicholas Weaver and
                  Vern Paxson and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Click Trajectories: End-to-End Analysis of the Spam Value Chain},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {431--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.24},
  doi          = {10.1109/SP.2011.24},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KanichCM11a,
  author       = {Chris Kanich and
                  Stephen Checkoway and
                  Keaton Mowery},
  editor       = {David Brumley and
                  Michal Zalewski},
  title        = {Putting Out a {HIT:} Crowdsourcing Malware Installs},
  booktitle    = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8,
                  2011, San Francisco, CA, USA, Proceedings},
  pages        = {71--80},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/event/woot11/tech/final\_files/Kanich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KanichCM11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KanichCMGWMLSV11,
  author       = {Chris Kanich and
                  Neha Chachra and
                  Damon McCoy and
                  Chris Grier and
                  David Y. Wang and
                  Marti Motoyama and
                  Kirill Levchenko and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {No Plan Survives Contact: Experience with Cybercrime Measurement},
  booktitle    = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11,
                  San Francisco, CA, USA, August 8, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/cset11/no-plan-survives-contact-experience-cybercrime-measurement},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KanichCMGWMLSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KanichWMHKLPVS11,
  author       = {Chris Kanich and
                  Nicholas Weaver and
                  Damon McCoy and
                  Tristan Halvorson and
                  Christian Kreibich and
                  Kirill Levchenko and
                  Vern Paxson and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Show Me the Money: Characterizing Spam-advertised Revenue},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Kanich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KanichWMHKLPVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PitsillidisLKKVPWS10,
  author       = {Andreas Pitsillidis and
                  Kirill Levchenko and
                  Christian Kreibich and
                  Chris Kanich and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Nicholas Weaver and
                  Stefan Savage},
  title        = {Botnet Judo: Fighting Spam with Itself},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/botnet-judo-fighting-spam-itself},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PitsillidisLKKVPWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MotoyamaLKMVS10,
  author       = {Marti Motoyama and
                  Kirill Levchenko and
                  Chris Kanich and
                  Damon McCoy and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic
                  Context},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {435--462},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Motoyama.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MotoyamaLKMVS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KanichKLEVPS09,
  author       = {Chris Kanich and
                  Christian Kreibich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  title        = {Spamalytics: an empirical analysis of spam marketing conversion},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {9},
  pages        = {99--107},
  year         = {2009},
  url          = {https://doi.org/10.1145/1562164.1562190},
  doi          = {10.1145/1562164.1562190},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/KanichKLEVPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/KreibichKLEVPS09,
  author       = {Christian Kreibich and
                  Chris Kanich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  editor       = {Wenke Lee},
  title        = {Spamcraft: An Inside Look At Spam Campaign Orchestration},
  booktitle    = {2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '09, Boston, MA, USA, April 21, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/leet-09/spamcraft-inside-look-spam-campaign-orchestration},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/KreibichKLEVPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/EnrightVSKL08,
  author       = {Brandon Enright and
                  Geoff Voelker and
                  Stefan Savage and
                  Chris Kanich and
                  Kirill Levchenko},
  title        = {Storm: When Researchers Collide},
  journal      = {login Usenix Mag.},
  volume       = {33},
  number       = {4},
  year         = {2008},
  url          = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/storm-when-researchers-collide},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/EnrightVSKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KanichKLEVPS08,
  author       = {Chris Kanich and
                  Christian Kreibich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Spamalytics: an empirical analysis of spam marketing conversion},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455774},
  doi          = {10.1145/1455770.1455774},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KanichKLEVPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KanichLEVS08,
  author       = {Chris Kanich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  editor       = {Fabian Monrose},
  title        = {The Heisenbot Uncertainty Problem: Challenges in Separating Bots from
                  Chaff},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/kanich/kanich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/KanichLEVS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KreibichKLEVPS08,
  author       = {Christian Kreibich and
                  Chris Kanich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  editor       = {Fabian Monrose},
  title        = {On the Spam Campaign Trail},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/kreibich/kreibich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/KreibichKLEVPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics