Publications

Found 17 results
Author Title [ Type(Desc)] Year
Filters: Author is Chris Grier  [Clear All Filters]
Conference Paper
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Cho, C.. Y., Caballero J., Grier C., Paxson V., & Song D. (2010).  Insights from the Inside: A View of Botnet Management from Infiltration.
Grier, C., Ballard L., Caballero J., Chachra N., Dietrich C. J., Levchenko K., et al. (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 821-832.
Cabellero, J.., Grier C., Kreibich C., & Paxson V. (2011).  Measuring Pay-per-Install: The Commoditization of Malware Distribution.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
Grier, C., Thomas K., Paxson V., & Zhang M. (2010).  @spam: The Underground on 140 Characters or Less. 27-37.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.