default search action
Kurt Thomas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. IMC 2024: 704-712 - [c45]Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum S. Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr:
Poisoning Web-Scale Training Datasets is Practical. SP 2024: 407-425 - [c44]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach:
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. USENIX Security Symposium 2024 - [i14]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. CoRR abs/2405.09757 (2024) - [i13]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach:
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. CoRR abs/2406.12161 (2024) - [i12]Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaz Bratanic, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein:
Supporting Human Raters with the Detection of Harmful Content using Large Language Models. CoRR abs/2406.12800 (2024) - [i11]Stephen Meisenbacher, Alexandra Klymenko, Patrick Gage Kelley, Sai Teja Peddinti, Kurt Thomas, Florian Matthes:
Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives. CoRR abs/2407.02027 (2024) - [i10]Yanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein:
Magika: AI-Powered Content-Type Detection. CoRR abs/2409.13768 (2024) - 2023
- [c43]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CHI 2023: 190:1-190:17 - [c42]Diana Freed, Natalie N. Bazarova, Sunny Consolvo, Eunice J. Han, Patrick Gage Kelley, Kurt Thomas, Dan Cosley:
Understanding Digital-Safety Experiences of Youth in the U.S. CHI 2023: 191:1-191:15 - [c41]Patrick Gage Kelley, Celestina Cornejo, Lisa Hayes, Ellie Shuo Jin, Aaron Sedley, Kurt Thomas, Yongwei Yang, Allison Woodruff:
"There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future. SOUPS 2023: 579-603 - [c40]Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, Kurt Thomas:
"Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators. USENIX Security Symposium 2023: 5629-5645 - [c39]Deepak Kumar, Jeff T. Hancock, Kurt Thomas, Zakir Durumeric:
Understanding the Behaviors of Toxic Accounts on Reddit. WWW 2023: 2797-2807 - [i9]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CoRR abs/2302.08057 (2023) - [i8]Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum S. Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr:
Poisoning Web-Scale Training Datasets is Practical. CoRR abs/2302.10149 (2023) - [i7]Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, David Kleidermacher:
Robust, privacy-preserving, transparent, and auditable on-device blocklisting. CoRR abs/2304.02810 (2023) - 2022
- [c38]Kurt Thomas, Patrick Gage Kelley, Sunny Consolvo, Patrawat Samermit, Elie Bursztein:
"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online. CHI 2022: 121:1-121:15 - [c37]Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas:
SoK: A Framework for Unifying At-Risk User Research. SP 2022: 2344-2360 - [e1]Kevin R. B. Butler, Kurt Thomas:
31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022. USENIX Association 2022, ISBN 978-1-939133-31-1 [contents] - [i6]Deepak Kumar, Jeff T. Hancock, Kurt Thomas, Zakir Durumeric:
Understanding Longitudinal Behaviors of Toxic Accounts on Reddit. CoRR abs/2209.02533 (2022) - 2021
- [c36]Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:
Designing Toxic Content Classification for a Diversity of Perspectives. SOUPS @ USENIX Security Symposium 2021: 299-318 - [c35]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c34]Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, Elie Bursztein:
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns. USENIX Security Symposium 2021: 1181-1198 - [i5]Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, Elie Bursztein:
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns. CoRR abs/2106.00236 (2021) - [i4]Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:
Designing Toxic Content Classification for a Diversity of Perspectives. CoRR abs/2106.04511 (2021) - [i3]Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas:
SoK: A Framework for Unifying At-Risk User Research. CoRR abs/2112.07047 (2021) - 2020
- [c33]Camelia Simoiu, Ali Zand, Kurt Thomas, Elie Bursztein:
Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk. Internet Measurement Conference 2020: 567-576 - [c32]Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. USENIX Security Symposium 2020: 361-377
2010 – 2019
- 2019
- [j1]Nithya Sambasivan, Nova Ahmed, Amna Batool, Elie Bursztein, Elizabeth F. Churchill, Laura Sanely Gaytán-Lugo, Tara Matthews, David Nemer, Kurt Thomas, Sunny Consolvo:
Toward Gender-Equitable Privacy and Security in South Asia. IEEE Secur. Priv. 17(4): 71-77 (2019) - [c31]Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney:
Five Years of the Right to be Forgotten. CCS 2019: 959-972 - [c30]Nithya Sambasivan, Amna Batool, Nova Ahmed, Tara Matthews, Kurt Thomas, Laura Sanely Gaytán-Lugo, David Nemer, Elie Bursztein, Elizabeth F. Churchill, Sunny Consolvo:
"They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia. CHI 2019: 2 - [c29]Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein:
Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium 2019: 1556-1571 - [c28]Periwinkle Doerfler, Kurt Thomas, Maija Marincenko, Juri Ranieri, Yu Jiang, Angelika Moscicki, Damon McCoy:
Evaluating Login Challenges as aDefense Against Account Takeover. WWW 2019: 372-382 - [c27]Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Kurt Thomas:
Hack for Hire: Exploring the Emerging Market for Account Hijacking. WWW 2019: 1279-1289 - [c26]Elie Bursztein, Einat Clarke, Michelle DeLaune, David M. Elifff, Nick Hsu, Lindsey Olson, John Shehan, Madhukar Thakur, Kurt Thomas, Travis Bright:
Rethinking the Detection of Child Sexual Abuse Imagery on the Internet. WWW 2019: 2601-2607 - 2018
- [c25]Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection. CNS 2018: 1-9 - [c24]Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, Oxana Comanescu:
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data. SOUPS @ USENIX Security Symposium 2018: 217-234 - [i2]Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection. CoRR abs/1803.06772 (2018) - 2017
- [c23]Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein:
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials. CCS 2017: 1421-1434 - [c22]Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - [c21]Danny Yuxing Huang, Doug Grundman, Kurt Thomas, Abhishek Kumar, Elie Bursztein, Kirill Levchenko, Alex C. Snoeren:
Pinning Down Abuse on Google Maps. WWW 2017: 1471-1479 - 2016
- [c20]Elie Bursztein, Artem Malyshev, Tadek Pietraszek, Kurt Thomas:
Picasso: Lightweight Device Class Fingerprinting for Web Clients. SPSM@CCS 2016: 93-102 - [c19]Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey:
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. RAID 2016: 143-164 - [c18]Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein:
Cloak of Visibility: Detecting When Machines Browse a Different Web. IEEE Symposium on Security and Privacy 2016: 743-758 - [c17]Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy:
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. USENIX Security Symposium 2016: 721-739 - [c16]Frank Li, Grant Ho, Eric Kuan, Yuan Niu, Lucas Ballard, Kurt Thomas, Elie Bursztein, Vern Paxson:
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. WWW 2016: 1009-1019 - 2015
- [c15]Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael D. Bailey, J. Alex Halderman:
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security. Internet Measurement Conference 2015: 27-39 - [c14]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167 - [c13]Nav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, Kurt Thomas:
Trends and Lessons from Three Years Fighting Malicious Extensions. USENIX Security Symposium 2015: 579-593 - [c12]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [i1]Peng Gao, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection. CoRR abs/1503.02985 (2015) - 2014
- [c11]Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy:
Dialing Back Abuse on Phone Verified Accounts. CCS 2014: 465-476 - [c10]Kurt Thomas, Frank Li, Chris Grier, Vern Paxson:
Consequences of Connectivity: Characterizing Account Hijacking on Twitter. CCS 2014: 489-500 - 2013
- [b1]Kurt Thomas:
The Role of the Underground Economy in Social Network Spam and Abuse. University of California, Berkeley, USA, 2013 - [c9]Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver:
Practical Comprehensive Bounds on Surreptitious Communication over DNS. USENIX Security Symposium 2013: 17-32 - [c8]Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. USENIX Security Symposium 2013: 195-210 - 2012
- [c7]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c6]Kurt Thomas, Chris Grier, Vern Paxson:
Adapting Social Spam Infrastructure for Political Censorship. LEET 2012 - 2011
- [c5]Kurt Thomas, Chris Grier, Dawn Song, Vern Paxson:
Suspended accounts in retrospect: an analysis of twitter spam. Internet Measurement Conference 2011: 243-258 - [c4]Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song:
Design and Evaluation of a Real-Time URL Spam Filtering Service. IEEE Symposium on Security and Privacy 2011: 447-462 - 2010
- [c3]Chris Grier, Kurt Thomas, Vern Paxson, Chao Michael Zhang:
@spam: the underground on 140 characters or less. CCS 2010: 27-37 - [c2]Kurt Thomas, David M. Nicol:
The Koobface botnet and the rise of social malware. MALWARE 2010: 63-70 - [c1]Kurt Thomas, Chris Grier, David M. Nicol:
unFriendly: Multi-party Privacy Risks in Social Networks. Privacy Enhancing Technologies 2010: 236-252
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint