Publications

Found 45 results
Author Title [ Type(Asc)] Year
Filters: Author is Christian Kreibich  [Clear All Filters]
Conference Paper
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Juan, L.., Kreibich C., Lin C.-H.., & Paxson V. (2008).  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 267-278.
Vallina-Rodriguez, N., Amann J., Kreibich C., Weaver N., & Paxson V. (2014).  A Tangled Mass: The Android Root Certificate Stores.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 3-14.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 52(9), 99-107.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Weaver, N., Kreibich C., & Paxson V. (2011).  Redirecting DNS for Ads and Profit.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
DiCioccio, L., Teixeira R., May M., & Kreibich C. (2012).  Probe and Pray: Using UPnP for Home Network Measurements. 96-105.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
McCoy, D., Dharmdasani H., Kreibich C., Voelker G. M., & Savage S. (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods. 845-856.
Felegyhazi, M., Kreibich C., & Paxson V. (2010).  On the Potential of Proactive Domain Blacklisting.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).

Pages