Biblio

Export 14 results:
Filters: Author is Kirill Levchenko  [Clear All Filters]
2019
Bhaskar N, Bland M, Levchenko K, Schulman A.  2019.  Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers. 28th {USENIX} Security Symposium ({USENIX} Security 19). :373--388.
Crow S, Farinholt B, Johannesmeyer B, Koscher K, Checkoway S, Savage S, Schulman A, Snoeren AC, Levchenko K.  2019.  Triton: A Software-Reconfigurable Federated Avionics Testbed. 12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19).
2017
Yang Z, Johannesmeyer B, Olesen ATrier, Lerner S, Levchenko K.  2017.  Dead Store Elimination (Still) Considered Harmful. 26th {USENIX} Security Symposium ({USENIX} Security 17). :1025--1040.
2011
Motoyama M, Levchenko K, Voelker GM.  2011.  Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. 20th {USENIX} Security Symposium ({USENIX} Security 11).
Liu H, Levchenko K, Felegyhazi M, Kreibich C, Maier G, Voelker GM.  2011.  On the Effects of Registrar-level Intervention. 4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 11).
Kanich C, Chachra N, McCoy D, Grier C, Wang D, Motoyama M, Levchenko K, Savage S, Voelker GM.  2011.  No Plan Survives Contact: Experience with Cybercrime Measurement. 4th Workshop on Cyber Security Experimentation and Test ({CSET} 11).
2009
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2009.  Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 09).
2008
Kanich C, Levchenko K, Enright B, Voelker GM, Savage S.  2008.  The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2008.  On the Spam Campaign Trail. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).