Chris Kanich

Orcid: 0000-0002-3836-2168

According to our database1, Chris Kanich authored at least 56 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Internet Sanctions on Russian Media: Actions and Effects.
CoRR, 2024

2023
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies.
CoRR, 2023

Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Longitudinal Analysis of Privacy Labels in the Apple App Store.
CoRR, 2022

Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Fair Decision-Making for Food Inspections.
Proceedings of the Equity and Access in Algorithms, Mechanisms, and Optimization, 2022

Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage.
Proceedings of the 30th USENIX Security Symposium, 2021

Plight at the End of the Tunnel - Legacy IPv6 Transition Mechanisms in the Wild.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Tales of Favicons and Caches: Persistent Tracking in Modern Browsers.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
On Measuring RPKI Relying Parties.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Tech Pains: Characterizations of Lived Cybersecurity Experiences.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web.
Proceedings of the 27th USENIX Security Symposium, 2018

It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

An Empirical Analysis of the Commercial VPN Ecosystem.
Proceedings of the Internet Measurement Conference 2018, 2018

DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Leveraging Semantic Transformation to Investigate Password Habits and Their Causes.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

DeepFP: A Deep Learning Framework For User Fingerprinting via Mobile Motion Sensors.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
The costs and benefits of treating the browser like an operating system: how ad blockers help us better understand how different browser features are used and who they benefit.
SIGCAS Comput. Soc., 2017

Evaluating Social Networks Using Task-Focused Network Inference.
CoRR, 2017

A General Framework For Task-Oriented Network Inference.
CoRR, 2017

Fifteen minutes of unwanted fame: detecting and characterizing doxing.
Proceedings of the 2017 Internet Measurement Conference, 2017

Network Model Selection for Task-Focused Attributed Network Inference.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Characterizing the impact of malware infections and remediation attempts through support forum analysis.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Characterizing fraud and its ramifications in affiliate marketing networks.
J. Cybersecur., 2016

Browser Feature Usage on the Modern Web.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

2015
No Please, After You: Detecting Fraud in Affiliate Marketing Networks.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015

One Thing Leads to Another: Credential Based Privilege Escalation.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Cloudsweeper and data-centric security.
SIGCAS Comput. Soc., 2014

The Long "Taile" of Typosquatting Domain Names.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Leveraging Machine Learning to Improve Unwanted Resource Filtering.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
CloudSweeper: enabling data-centric document management for secure cloud archives.
Proceedings of the CCSW'13, 2013

Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Characterizing internet scams through underground infrastructure infiltration.
PhD thesis, 2012

Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Taster's choice: a comparative analysis of spam feeds.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

2011
Show Me the Money: Characterizing Spam-advertised Revenue.
Proceedings of the 20th USENIX Security Symposium, 2011

No Plan Survives Contact: Experience with Cybercrime Measurement.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Putting Out a HIT: Crowdsourcing Malware Installs.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

GQ: practical containment for measuring modern malware systems.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2010
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Proceedings of the 19th USENIX Security Symposium, 2010

Botnet Judo: Fighting Spam with Itself.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Spamalytics: an empirical analysis of spam marketing conversion.
Commun. ACM, 2009

Spamcraft: An Inside Look At Spam Campaign Orchestration.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

2008
Storm: When Researchers Collide.
login Usenix Mag., 2008

On the Spam Campaign Trail.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008


  Loading...