Kurt Thomas

Orcid: 0000-0002-3762-5851

According to our database1, Kurt Thomas authored at least 49 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Robust, privacy-preserving, transparent, and auditable on-device blocklisting.
CoRR, 2023

Poisoning Web-Scale Training Datasets is Practical.
CoRR, 2023

Understanding the Behaviors of Toxic Accounts on Reddit.
Proceedings of the ACM Web Conference 2023, 2023

"Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators.
Proceedings of the 32nd USENIX Security Symposium, 2023

"There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Understanding Digital-Safety Experiences of Youth in the U.S.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Understanding Longitudinal Behaviors of Toxic Accounts on Reddit.
CoRR, 2022

SoK: A Framework for Unifying At-Risk User Research.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Designing Toxic Content Classification for a Diversity of Perspectives.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Toward Gender-Equitable Privacy and Security in South Asia.
IEEE Secur. Priv., 2019

Hack for Hire: Exploring the Emerging Market for Account Hijacking.
Proceedings of the World Wide Web Conference, 2019

Evaluating Login Challenges as aDefense Against Account Takeover.
Proceedings of the World Wide Web Conference, 2019

Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.
Proceedings of the World Wide Web Conference, 2019

Protecting accounts from credential stuffing with password breach alerting.
Proceedings of the 28th USENIX Security Symposium, 2019

"They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019


2018
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Pinning Down Abuse on Google Maps.
Proceedings of the 26th International Conference on World Wide Web, 2017


Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the 25th International Conference on World Wide Web, 2016


Cloak of Visibility: Detecting When Machines Browse a Different Web.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Picasso: Lightweight Device Class Fingerprinting for Web Clients.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection.
CoRR, 2015

Framing Dependencies Introduced by Underground Commoditization.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Trends and Lessons from Three Years Fighting Malicious Extensions.
Proceedings of the 24th USENIX Security Symposium, 2015

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Dialing Back Abuse on Phone Verified Accounts.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
The Role of the Underground Economy in Social Network Spam and Abuse.
PhD thesis, 2013

Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Adapting Social Spam Infrastructure for Political Censorship.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012


2011
Design and Evaluation of a Real-Time URL Spam Filtering Service.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Suspended accounts in retrospect: an analysis of twitter spam.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2010
unFriendly: Multi-party Privacy Risks in Social Networks.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

The Koobface botnet and the rise of social malware.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

@spam: the underground on 140 characters or less.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...