Follow
Chris Grier
Chris Grier
University of California, Berkeley
Verified email at imchris.org - Homepage
Title
Cited by
Year
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1572015
Framing dependencies introduced by underground commoditization
K Huang, DWEBC GrierD, TJ Holt, C Kruegel, D McCoy, S Savage, ...
Workshop on the Economics of Information Security, 2015
1472015
Characterizing large-scale click fraud in zeroaccess
P Pearce, V Dave, C Grier, K Levchenko, S Guha, D McCoy, V Paxson, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
952014
Dialing back abuse on phone verified accounts
K Thomas, D Iatskiv, E Bursztein, T Pietraszek, C Grier, D McCoy
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
482014
Consequences of connectivity: Characterizing account hijacking on twitter
K Thomas, F Li, C Grier, V Paxson
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
942014
Botcoin: Monetizing stolen cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS 2014, 1-16, 2014
1292014
Botcoin: Monetizing Stolen Cycles
K Levchenko, V Dave, S Savage, AC Snoeren, D McCoy, C Grier, ...
12014
The zeroaccess auto-clicking and search-hijacking click fraud modules
P Pearce, C Grier, V Paxson, V Dave, D McCoy, GM Voelker, S Savage
72013
The ZeroAccess Auto-clicking and Search-hijacking Click Fraud Modules: Technical Report
PJ Pearce, C Grier, V Paxson, V Dave, D McCoy, GM Voelker, S Savage
[Department of Computer Science and Engineering], University of California …, 2013
2013
The ZeroAccess Auto-Clicking and Search Hijacking Click Fraud Modules (Technical Report) DRAFT
P Pearce, C Grier, V Paxson, V Dave, D McCoy, GM Voelker, S Savage
12013
Understanding the domain registration behavior of spammers
S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ...
Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013
1192013
Revolver: An automated approach to the detection of evasive web-based malware
A Kapravelos, Y Shoshitaishvili, M Cova, C Kruegel, G Vigna
22nd USENIX Security Symposium (USENIX Security 13), 637-652, 2013
410*2013
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013
624*2013
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3042012
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE symposium on security and privacy, 65-79, 2012
3082012
Hypervisors as a foothold for personal computer security: An agenda for the research community
M Zaharia, S Katti, C Grier, V Paxson, S Shenker, I Stoica, D Song
University of California, Berkeley, Tech. Rep, 2012
62012
Browser Exploits as a Service: The Monetization of Driveby Downloads
C Grier, L Ballard, J Caballero, N Chachra, C Dietrich, K Levchenko, ...
22012
Adapting social spam infrastructure for political censorship
K Thomas, C Grier, V Paxson
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012
1272012
Suspended accounts in retrospect: an analysis of twitter spam
K Thomas, C Grier, D Song, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
6242011
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3692011
The system can't perform the operation now. Try again later.
Articles 1–20