Chris Kanich
Cited by
Cited by
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
USENIX Security Symposium 10, 3, 2010
The long “taile” of typosquatting domain names
J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich
23rd {USENIX} Security Symposium ({USENIX} Security 14), 191-206, 2014
Show Me the Money: Characterizing Spam-advertised Revenue.
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
USENIX Security Symposium 35, 2011
Spamcraft: An Inside Look At Spam Campaign Orchestration.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET, 2009
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
On the spam campaign trail.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET 8 (2008), 1-9, 2008
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
C Kanich, K Levchenko, B Enright, GM Voelker, S Savage
LEET 8, 1-9, 2008
Gq: Practical containment for measuring modern malware systems
C Kreibich, N Weaver, C Kanich, W Cui, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
Fifteen minutes of unwanted fame: Detecting and characterizing doxing
P Snyder, P Doerfler, C Kanich, D McCoy
proceedings of the 2017 Internet Measurement Conference, 432-444, 2017
An empirical analysis of the commercial vpn ecosystem
MT Khan, J DeBlasio, GM Voelker, AC Snoeren, C Kanich, ...
Proceedings of the Internet Measurement Conference 2018, 443-456, 2018
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting
MT Khan, X Huo, Z Li, C Kanich
2015 IEEE Symposium on Security and Privacy, 135-150, 2015
Most websites don't need to vibrate: A cost-benefit approach to improving browser security
P Snyder, C Taylor, C Kanich
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web.
M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis
USENIX Security Symposium, 1475-1492, 2018
Leveraging machine learning to improve unwanted resource filtering
S Bhagavatula, C Dunn, C Kanich, M Gupta, B Ziebart
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
Taster's choice: a comparative analysis of spam feeds
A Pitsillidis, C Kanich, GM Voelker, K Levchenko, S Savage
Proceedings of the 2012 Internet Measurement Conference, 427-440, 2012
Browser feature usage on the modern web
P Snyder, L Ansari, C Taylor, C Kanich
Proceedings of the 2016 Internet Measurement Conference, 97-110, 2016
Leveraging semantic transformation to investigate password habits and their causes
A Hanamsagar, SS Woo, C Kanich, J Mirkovic
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
Deepauth: A framework for continuous user re-authentication in mobile apps
S Amini, V Noroozi, A Pande, S Gupte, PS Yu, C Kanich
Proceedings of the 27th ACM International Conference on Information and …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20