Christian Kreibich

According to our database1, Christian Kreibich authored at least 45 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Opportunities and Challenges of Ad-based Measurements from the Edge of the Network.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017

2016
Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem.
CoRR, 2016

A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

RevProbe: detecting silent reverse proxies in malicious server infrastructures.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Haystack: In Situ Mobile Traffic Analysis in User Space.
CoRR, 2015

Header Enrichment or ISP Enrichment?: Emerging Privacy Threats in Mobile Networks.
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015

Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

2014
Here Be Web Proxies.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

A Tangled Mass: The Android Root Certificate Stores.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

2013
Understanding the domain registration behavior of spammers.
Proceedings of the 2013 Internet Measurement Conference, 2013

2012
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

The BIZ Top-Level Domain: Ten Years Later.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

Probe and Pray: Using UPnP for Home Network Measurements.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

Fathom: a browser-based network measurement platform.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Priceless: the role of payments in abuse-advertised goods.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Redirecting DNS for Ads and Profit.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011

Show Me the Money: Characterizing Spam-advertised Revenue.
Proceedings of the 20th USENIX Security Symposium, 2011

Measuring Pay-per-Install: The Commoditization of Malware Distribution.
Proceedings of the 20th USENIX Security Symposium, 2011

Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Experiences from Netalyzr with engaging users in end-system measurement.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

On the Effects of Registrar-level Intervention.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

GQ: practical containment for measuring modern malware systems.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

What's Clicking What? Techniques and Innovations of Today's Clickbots.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Botnet Judo: Fighting Spam with Itself.
Proceedings of the Network and Distributed System Security Symposium, 2010

On the Potential of Proactive Domain Blacklisting.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

Netalyzr: illuminating the edge network.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
Spamalytics: an empirical analysis of spam marketing conversion.
Commun. ACM, 2009

Spamcraft: An Inside Look At Spam Campaign Orchestration.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Principles for Developing Comprehensive Network Visibility.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

On the Spam Campaign Trail.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Structural traffic analysis for network security monitoring.
PhD thesis, 2007

The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

2006
Only 365 days left until the Sigcomm deadline.
Comput. Commun. Rev., 2006

Unexpected means of protocol inference.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Efficient sequence alignment of network traffic.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity.
Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, 2005

Policy-Controlled Event Management for Distributed Intrusion Detection.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
Proceedings of the Detection of Intrusions and Malware, 2005

2004
Honeycomb: creating intrusion detection signatures using honeypots.
Comput. Commun. Rev., 2004

Design and Implementation of Netdude, a Framework for Packet Trace Manipulation (Awarded Best Student Paper!).
Proceedings of the FREENIX Track: 2004 USENIX Annual Technical Conference, June 27, 2004

2001
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics.
Proceedings of the 10th USENIX Security Symposium, 2001


  Loading...