Nicolas Christin

Orcid: 0000-0002-2506-8031

Affiliations:
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Nicolas Christin authored at least 128 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Blockchain Censorship.
CoRR, 2023

Misbehavior and Account Suspension in an Online Financial Communication Platform.
Proceedings of the ACM Web Conference 2023, 2023

Is your digital neighbor a reliable investment advisor?
Proceedings of the ACM Web Conference 2023, 2023

Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment.
Proceedings of the 32nd USENIX Security Symposium, 2023

User Participation in Cryptocurrency Derivative Markets.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
How Do Home Computer Users Browse the Web?
ACM Trans. Web, 2022

Observations From an Online Security Competition and Its Implications on Crowdsourced Security.
CoRR, 2022

The effectiveness of security measures: technical perspective.
Commun. ACM, 2022

Measurement by Proxy: On the Accuracy of Online Marketplace Measurements.
Proceedings of the 31st USENIX Security Symposium, 2022

On recruiting and retaining users for security-sensitive longitudinal measurement panels.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda.
Proceedings of the Proceedings First Workshop on Applicable Formal Methods, 2021

Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Where are you taking me?Understanding Abusive Traffic Distribution Systems.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Towards Understanding Cryptocurrency Derivatives: A Case Study of BitMEX.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Self-Supervised Euphemism Detection and Identification for Content Moderation.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Open Market or Ghost Town? The Curious Case of OpenBazaar.
Proceedings of the Financial Cryptography and Data Security, 2020

Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Why people (don't) use password managers effectively.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Adversarial Matching of Dark Net Market Vendor Accounts.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Revisiting the Risks of Bitcoin Currency Exchange Closure.
ACM Trans. Internet Techn., 2018

Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking.
ACM Trans. Internet Techn., 2018

An Empirical Analysis of Traceability in the Monero Blockchain.
Proc. Priv. Enhancing Technol., 2018

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Proceedings of the 27th USENIX Security Symposium, 2018

User Behaviors and Attitudes Under Password Expiration Policies.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation.
Proceedings of the Internet Measurement Conference 2018, 2018

"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Predicting Impending Exposure to Malicious Content from User Behavior.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Better Passwords through Science (and Neural Networks).
login Usenix Mag., 2017

Topics of Controversy: An Empirical Analysis of Web Censorship Lists.
Proc. Priv. Enhancing Technol., 2017

Push-Button Verification of File Systems via Crash Refinement.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Automatic Application Identification from Billions of Files.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Email typosquatting.
Proceedings of the 2017 Internet Measurement Conference, 2017

Design and Evaluation of a Data-Driven Password Meter.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Designing Password Policies for Strength and Usability.
ACM Trans. Inf. Syst. Secur., 2016

Beaver: A Decentralized Anonymous Marketplace with Secure Reputation.
IACR Cryptol. ePrint Arch., 2016

A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers.
CoRR, 2016

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 25th USENIX Security Symposium, 2016

Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Do Users' Perceptions of Password Security Match Reality?
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Usability and Security of Text Passwords on Mobile Devices.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Toward Mending Two Nation-Scale Brokered Identification Systems.
Proc. Priv. Enhancing Technol., 2015

Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Concentrating Correctly on Cybercrime Concentration.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Proceedings of the 24th USENIX Security Symposium, 2015

Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem.
Proceedings of the 24th USENIX Security Symposium, 2015

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Audit Games with Multiple Defender Resources.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Automatically Detecting Vulnerable Websites Before They Turn Malicious.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

General Requirements of a Hybrid-Modeling Framework for Cyber Security.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Building the security behavior observatory: an infrastructure for long-term monitoring of client machines.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Empirically Measuring WHOIS Misuse.
Proceedings of the Computer Security - ESORICS 2014, 2014

Can long passwords be secure and usable?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

A5: Automated Analysis of Adversarial Android Applications.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Evading android runtime analysis via sandbox detection.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Passe-Partout: A General Collection Methodology for Android Devices.
IEEE Trans. Inf. Forensics Secur., 2013

Traveling the silk road: a measurement analysis of a large anonymous online marketplace.
Proceedings of the 22nd International World Wide Web Conference, 2013

Pick your poison: pricing and inventories at unlicensed online pharmacies.
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013

Audit Games.
Proceedings of the IJCAI 2013, 2013

Adaptive Regret Minimization in Bounded-Memory Games.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks.
Proceedings of the Financial Cryptography and Data Security, 2013

Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk.
Proceedings of the Financial Cryptography and Data Security, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

Sweetening android lemon markets: measuring and combating malware in application marketplaces.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Audit Mechanisms for Provable Risk Management and Accountable Data Governance.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Toward a general collection methodology for Android devices.
Digit. Investig., 2011

All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
Proceedings of the 20th USENIX Security Symposium, 2011

Audit Mechanisms for Privacy Protection in Healthcare Environments.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

Moving Forward, Building an Ethics Community (Panel Statements).
Proceedings of the Financial Cryptography and Data Security, 2011

It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Proceedings of the Financial Cryptography and Data Security, 2011

Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Fashion crimes: trending-term exploitation on the web.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Encountering stronger password requirements: user attitudes and behaviors.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

This is your data on drugs: lessons computer security can learn from the drug war.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

A Comparative Usability Evaluation of Traditional Password Managers.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Uncertainty in Interdependent Security Games.
Proceedings of the Decision and Game Theory for Security, 2010

When Information Improves Information Security.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010

Dissecting one click frauds.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
The Price of Uncertainty in Security Games.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

New directions in multisensory authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

mFerio: the design and evaluation of a peer-to-peer mobile payment system.
Proceedings of the 7th International Conference on Mobile Systems, 2009

2008
Secure or insure?: a game-theoretic analysis of information security games.
Proceedings of the 17th International Conference on World Wide Web, 2008

Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Use Your Illusion: secure authentication usable anywhere.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Security and insurance management in networks with heterogeneous agents.
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008

Predicted and Observed User Behavior in the Weakest-link Security Game.
Proceedings of the Usability, Psychology, and Security, 2008

Countermeasures against Government-Scale Monetary Forgery.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Undercover: authentication usable in front of prying eyes.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms.
IEEE/ACM Trans. Netw., 2007

Power to the people: securing the internet one edge at a time.
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007

On the Feasibility of Switching ISPs in Residential Multihoming.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

2006
Providing Service Guarantees in High-Speed Switching Systems with Feedback Output Queuing.
IEEE Trans. Parallel Distributed Syst., 2006

The QoSbox: Quantitative service differentiation in BSD routers.
Comput. Networks, 2006

Taking Advantage of Multihoming with Session Layer Striping.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Marking algorithms for service differentiation of TCP traffic.
Comput. Commun., 2005

Content availability, pollution and poisoning in file sharing peer-to-peer networks.
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

A cost-based analysis of overlay routing geometries.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Near Rationality and Competitive Equilibria in Networked Systems
CoRR, 2004

On the Cost of Participating in a Peer-to-Peer Network.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
A QoS architecture for quantitative service differentiation.
IEEE Commun. Mag., 2003

2002
Rate allocation and buffer management for differentiated services.
Comput. Networks, 2002

A Quantitative Assured Forwarding Service.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
JoBS: Joint Buffer Management and Scheduling for Differentiated Services.
Proceedings of the Quality of Service, 2001


  Loading...