Understanding the mirai botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... 26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017 | 2607 | 2017 |
@ spam: the underground on 140 characters or less C Grier, K Thomas, V Paxson, M Zhang Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 829 | 2010 |
Design and Evaluation of a Real-Time URL Spam Filtering Service K Thomas, C Grier, J Ma, V Paxson, D Song Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 2011 | 679 | 2011 |
Suspended accounts in retrospect: an analysis of twitter spam K Thomas, C Grier, D Song, V Paxson Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 625 | 2011 |
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse K Thomas, D McCoy, C Grier, A Kolcz, V Paxson 22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013 | 369 | 2013 |
Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 308 | 2012 |
Data breaches, phishing, or malware? Understanding the risks of stolen credentials K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ... Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 256 | 2017 |
Neither snow nor rain nor MITM... an empirical analysis of email delivery security Z Durumeric, D Adrian, A Mirian, J Kasten, E Bursztein, N Lidzborski, ... Proceedings of the 2015 Internet Measurement Conference, 27-39, 2015 | 188 | 2015 |
The Koobface botnet and the rise of social malware K Thomas, DM Nicol 2010 5th International Conference on Malicious and Unwanted Software, 63-70, 2010 | 188 | 2010 |
unfriendly: Multi-party privacy risks in social networks K Thomas, C Grier, DM Nicol Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010 | 187 | 2010 |
" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ... proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 163 | 2019 |
Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 163 | 2015 |
Sok: Hate, harassment, and the changing landscape of online abuse K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ... 2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021 | 160 | 2021 |
Protecting accounts from credential stuffing with password breach alerting K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ... 28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019 | 160 | 2019 |
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ... 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 159 | 2020 |
Framing Dependencies Introduced by Underground Commoditization K Thomas, DY Huang, D Wang, B Elie, C Grier, TJ Holt, C Kruegel, ... Workshop on the Economics of Information Security, 2015 | 148 | 2015 |
Poisoning web-scale training datasets is practical N Carlini, M Jagielski, CA Choquette-Choo, D Paleka, W Pearce, ... 2024 IEEE Symposium on Security and Privacy (SP), 407-425, 2024 | 135 | 2024 |
Adapting social spam infrastructure for political censorship K Thomas, C Grier, V Paxson Proceedings of 5th USENIX conf. on LEET 12, 13, 2012 | 129 | 2012 |
Cloak of visibility: Detecting when machines browse a different web L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ... 2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016 | 116 | 2016 |
Trends and Lessons from Three Years Fighting Malicious Extensions N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ... Usenix Security, 2015 | 115 | 2015 |