Biblio

Export 13 results:
Filters: Author is Christian Kreibich  [Clear All Filters]
2011
Liu H, Levchenko K, Felegyhazi M, Kreibich C, Maier G, Voelker GM.  2011.  On the Effects of Registrar-level Intervention. 4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 11).
Caballero J, Grier C, Kreibich C, Paxson V.  2011.  Measuring Pay-per-Install: The Commoditization of Malware Distribution. 20th {USENIX} Security Symposium ({USENIX} Security 11).
Weaver N, Kreibich C, Paxson V.  2011.  Redirecting DNS for Ads and Profit. {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 11).
Kanich C, Weaver N, Halvorson T, Kreibich C, Paxson V.  2011.  Show Me the Money: Characterizing Spam-advertised Revenue. 20th {USENIX} Security Symposium ({USENIX} Security 11).
2010
Felegyhazi M, Kreibich C, Paxson V.  2010.  On the Potential of Proactive Domain Blacklisting. 3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 10).
2009
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2009.  Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 09).
2008
Allman M, Kreibich C, Paxson V, Sommer R, Weaver N.  2008.  Principles for Developing Comprehensive Network Visibility. 3rd {USENIX} Workshop on Hot Topics in Security (HotSec 08).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2008.  On the Spam Campaign Trail. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
2007
Allman M, Kreibich C, Paxson V, Sommer R, Weaver N.  2007.  The Strengths of Weaker Identities: Opportunistic Personas. 2nd {USENIX} Workshop on Hot Topics in Security (HotSec 07).
2005
Kreibich C.  2005.  Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. 2005 {USENIX} Annual Technical Conference ({USENIX} {ATC} 05).
2004
Kreibich C.  2004.  Design and Implementation of Netdude, a Framework for Packet Trace Manipulation. 2004 {USENIX} Annual Technical Conference ({USENIX} {ATC} 04).