Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 157 | 2015 |
Framing dependencies introduced by underground commoditization K Huang, DWEBC GrierD, TJ Holt, C Kruegel, D McCoy, S Savage, ... Workshop on the Economics of Information Security, 2015 | 147 | 2015 |
Characterizing large-scale click fraud in zeroaccess P Pearce, V Dave, C Grier, K Levchenko, S Guha, D McCoy, V Paxson, ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 95 | 2014 |
Dialing back abuse on phone verified accounts K Thomas, D Iatskiv, E Bursztein, T Pietraszek, C Grier, D McCoy Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 48 | 2014 |
Consequences of connectivity: Characterizing account hijacking on twitter K Thomas, F Li, C Grier, V Paxson Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 94 | 2014 |
Botcoin: Monetizing stolen cycles. DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ... NDSS 2014, 1-16, 2014 | 129 | 2014 |
Botcoin: Monetizing Stolen Cycles K Levchenko, V Dave, S Savage, AC Snoeren, D McCoy, C Grier, ... | 1 | 2014 |
The zeroaccess auto-clicking and search-hijacking click fraud modules P Pearce, C Grier, V Paxson, V Dave, D McCoy, GM Voelker, S Savage | 7 | 2013 |
The ZeroAccess Auto-clicking and Search-hijacking Click Fraud Modules: Technical Report PJ Pearce, C Grier, V Paxson, V Dave, D McCoy, GM Voelker, S Savage [Department of Computer Science and Engineering], University of California …, 2013 | | 2013 |
The ZeroAccess Auto-Clicking and Search Hijacking Click Fraud Modules (Technical Report) DRAFT P Pearce, C Grier, V Paxson, V Dave, D McCoy, GM Voelker, S Savage | 1 | 2013 |
Understanding the domain registration behavior of spammers S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ... Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013 | 119 | 2013 |
Revolver: An automated approach to the detection of evasive web-based malware A Kapravelos, Y Shoshitaishvili, M Cova, C Kruegel, G Vigna 22nd USENIX Security Symposium (USENIX Security 13), 637-652, 2013 | 410* | 2013 |
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse K Thomas, D McCoy, C Grier, A Kolcz, V Paxson 22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013 | 624* | 2013 |
Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 304 | 2012 |
Prudent practices for designing malware experiments: Status quo and outlook C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ... 2012 IEEE symposium on security and privacy, 65-79, 2012 | 308 | 2012 |
Hypervisors as a foothold for personal computer security: An agenda for the research community M Zaharia, S Katti, C Grier, V Paxson, S Shenker, I Stoica, D Song University of California, Berkeley, Tech. Rep, 2012 | 6 | 2012 |
Browser Exploits as a Service: The Monetization of Driveby Downloads C Grier, L Ballard, J Caballero, N Chachra, C Dietrich, K Levchenko, ... | 2 | 2012 |
Adapting social spam infrastructure for political censorship K Thomas, C Grier, V Paxson 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012 | 127 | 2012 |
Suspended accounts in retrospect: an analysis of twitter spam K Thomas, C Grier, D Song, V Paxson Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 624 | 2011 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 369 | 2011 |