Kirill Levchenko

Orcid: 0000-0003-4527-9749

Affiliations:
  • University of California, San Diego, USA


According to our database1, Kirill Levchenko authored at least 63 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Story Beyond the Eye: Glyph Positions Break PDF Text Redaction.
Proc. Priv. Enhancing Technol., July, 2023

Explaining Why Fake Photos are Fake: Does It Work?
Proc. ACM Hum. Comput. Interact., 2023

Responding to Network Failures at Data-plane Speeds with Network Programmability.
Proceedings of the NOMS 2023, 2023

Poster: Empirically Testing the PacketLab Model.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2022
Casing the Vault: Security Analysis of Vault Applications.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

All Eyes On Me: Inside Third Party Trackers' Exfiltration of PHI from Healthcare Providers' Online Systems.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

PacketLab: tools alpha release and demo.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
Dynamic Property Enforcement in Programmable Data Planes.
IEEE/ACM Trans. Netw., 2021

Jetset: Targeted Firmware Rehosting for Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Clairvoyance: Inferring Blocklist Use on the Internet.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

2020
Dark Matter: Uncovering the DarkComet RAT Ecosystem.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

IntSight: diagnosing SLO violations with in-band network telemetry.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Triton: A Software-Reconfigurable Federated Avionics Testbed.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers.
Proceedings of the 28th USENIX Security Symposium, 2019

SparSDR: Sparsity-proportional Backhaul and Compute for SDRs.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

2018
Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018

Tracking Ransomware End-to-end.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Uncovering Bugs in P4 Programs with Assertion-based Verification.
Proceedings of the Symposium on SDN Research, 2018

Estimating Profitability of Alternative Cryptocurrencies (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

2017
Tools for Automated Analysis of Cybercriminal Markets.
Proceedings of the 26th International Conference on World Wide Web, 2017

Pinning Down Abuse on Google Maps.
Proceedings of the 26th International Conference on World Wide Web, 2017

Dead Store Elimination (Still) Considered Harmful.
Proceedings of the 26th USENIX Security Symposium, 2017

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Sandboxing Data Plane Programs for Fun and Profit.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Packetlab: a universal measurement endpoint interface.
Proceedings of the 2017 Internet Measurement Conference, 2017

Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

Securing Web Applications with Predicate Access Control.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
Security by Any Other Name: On the Effectiveness of Provider Based Email Security.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
XXXtortion?: inferring registration intent in the .XXX TLD.
Proceedings of the 23rd International World Wide Web Conference, 2014

Botcoin: Monetizing Stolen Cycles.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Characterizing Large-Scale Click Fraud in ZeroAccess.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

On The Security of Mobile Cockpit Information Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.
login Usenix Mag., 2013

A comparison of syslog and IS-IS for network failure analysis.
Proceedings of the 2013 Internet Measurement Conference, 2013

2012
Router Support for Fine-Grained Latency Measurements.
IEEE/ACM Trans. Netw., 2012

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

The BIZ Top-Level Domain: Ten Years Later.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

Taster's choice: a comparative analysis of spam feeds.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012


2011
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.
Proceedings of the 20th USENIX Security Symposium, 2011

Show Me the Money: Characterizing Spam-advertised Revenue.
Proceedings of the 20th USENIX Security Symposium, 2011

No Plan Survives Contact: Experience with Cybercrime Measurement.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

On the Effects of Registrar-level Intervention.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

An analysis of underground forums.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Proximax: Measurement-Driven Proxy Dissemination (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Measuring Online Service Availability Using Twitter.
Proceedings of the 3rd Workshop on Online Social Networks, 2010

Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Proceedings of the 19th USENIX Security Symposium, 2010

California fault lines: understanding the causes and impact of network failures.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Botnet Judo: Fighting Spam with Itself.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Spamalytics: an empirical analysis of spam marketing conversion.
Commun. ACM, 2009

Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Spamcraft: An Inside Look At Spam Campaign Orchestration.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

2008
XL : a communication-efficient routing algorithm.
PhD thesis, 2008

Storm: When Researchers Collide.
login Usenix Mag., 2008

Xl: an efficient network routing algorithm.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

On the Spam Campaign Trail.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

2006
Unexpected means of protocol inference.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
Improved range-summable random variable construction algorithms.
Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2005

2004
On the difficulty of scalably detecting network attacks.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004


  Loading...