-
2
-
-
80955131343
-
Judging a site by its content: Learning the textual, structural, an d visual features of malicious web pages
-
Chicago, IL, Oct
-
BANNUR, S. N., SAUL, L. K., AND SAVAGE, S. Judging a site by its content: learning the textual, structural, an d visual features of malicious Web pages. In Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC) (Chicago, IL, Oct. 2011).
-
(2011)
Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC)
-
-
Bannur, S.N.1
Saul, L.K.2
Savage, S.3
-
3
-
-
84910127642
-
Empirically characterizing domain abuse and the revenue impact of blacklisting
-
State College, PA. June
-
CHACHRA, N., MCCOY, D., SAVAGE, S., AND VOELKER, G. M. Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting. In Proceedings of the Workshop on the Economics of Information Security (WEIS) (State College, PA., June 2014).
-
(2014)
Proceedings of the Workshop on the Economics of Information Security (WEIS)
-
-
Chachra, N.1
McCoy, D.2
Savage, S.3
Voelker, G.M.4
-
4
-
-
85016624965
-
-
March
-
CHAFFEY, D. Ecommerce conversion rates. http://www.smartinsights.com/ecommerce/ecommerce-analytics/ecommerce-conversion-rates/, March 2014.
-
(2014)
Ecommerce Conversion Rates
-
-
Chaffey, D.1
-
5
-
-
84907029448
-
Knock it off: Profiling the online storefronts of counterfeit merchandise
-
New York, NY, August
-
DER, M. F., SAUL, L. K., SAVAGE, S., AND VOELKER, G. M. Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise. In Proceedings of the ACM SIGKDD Conference (New York, NY, August 2014).
-
(2014)
Proceedings of the ACM SIGKDD Conference
-
-
Der, M.F.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
7
-
-
70049110853
-
-
FAN, R. E., CHANG, K. W., HSIEH, C. J., WANG, X. R., AND LIN, C. J. LIBLINEAR: A Library for Large Linear Classification. http://www.csie.ntu.edu.tw/~cjlin/liblinear/.
-
LIBLINEAR: A Library for Large Linear Classification
-
-
Fan, R.E.1
Chang, K.W.2
Hsieh, C.J.3
Wang, X.R.4
Lin, C.J.5
-
11
-
-
84869388520
-
Manufacturing compromise: The emergence of exploit-as-a-service
-
Raleigh, NC, October
-
GRIER, C., BALLARD, L., CABALLERO, J., CHACHRA, N., DIETRICH, C. J., LEVCHENKO, K., MAVROMMATIS, P., MCCOY, D., NAPPA, A., PITSILLIDIS, A., PROVOS, N., RAFIQUE, M. Z., RAJAB, M. A., ROSSOW, C., THOMAS, K., PAXSON, V., SAVAGE, S., AND VOELKER, G. M. Manufacturing Compromise: The Emergence of Exploit-as-a-Service. In Proceedings of the ACM Conference on Computer and Communications Security (Raleigh, NC, October 2012).
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Grier, C.1
Ballard, L.2
Caballero, J.3
Chachra, N.4
Dietrich, C.J.5
Levchenko, K.6
Mavrommatis, P.7
McCoy, D.8
Nappa, A.9
Pitsillidis, A.10
Provos, N.11
Rafique, M.Z.12
Rajab, M.A.13
Rossow, C.14
Thomas, K.15
Paxson, V.16
Savage, S.17
Voelker, G.M.18
-
12
-
-
81255149250
-
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
-
London, UK, June
-
HERLEY, C., AND FLORENCIO, D. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. In Proceedings of the Workshop on the Economics of Information Security (WEIS) (London, UK, June 2009).
-
(2009)
Proceedings of the Workshop on the Economics of Information Security (WEIS)
-
-
Herley, C.1
Florencio, D.2
-
14
-
-
84870640932
-
Evil seed: A guided approach to finding malicious web pages
-
San Francisco, CA, May
-
INVERNIZZI, L., BENVENUTI, S., COVA, M., MILANI-COMPARETTI, P., KRUEGEL, C., AND VIGNA, G. Evil Seed: A Guided Approach to Finding Malicious Web Pages. In Proceedings of the IEEE Symposium and Security and Privacy (San Francisco, CA, May 2012).
-
(2012)
Proceedings of the IEEE Symposium and Security and Privacy
-
-
Invernizzi, L.1
Benvenuti, S.2
Cova, M.3
Milani-comparetti, P.4
Kruegel, C.5
Vigna, G.6
-
15
-
-
85076487784
-
Deseo: Combating search-result poisoning
-
San Francisco, CA, August
-
JOHN, J. P., YU, F., XIE, Y., KRISHNAMURTHY, A., AND ABADI, M. deSEO: Combating Search-Result Poisoning. In Proceedings of the USENIX Security Symposium (San Francisco, CA, August 2011).
-
(2011)
Proceedings of the USENIX Security Symposium
-
-
John, J.P.1
Yu, F.2
Xie, Y.3
Krishnamurthy, A.4
Abadi, M.5
-
16
-
-
85076490024
-
Show me the money: Characterizing spam-advertised revenue
-
San Francisco, CA, August
-
KANICH, C., WEAVER, N., MCCOY, D., HALVORSON, T., KREIBICH, C., LEVCHENKO, K., PAXSON, V., VOELKER, G. M., AND SAVAGE, S. Show Me the Money: Characterizing Spam-advertised Revenue. In Proceedings of the USENIX Security Symposium (San Francisco, CA, August 2011).
-
(2011)
Proceedings of the USENIX Security Symposium
-
-
Kanich, C.1
Weaver, N.2
McCoy, D.3
Halvorson, T.4
Kreibich, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.M.8
Savage, S.9
-
17
-
-
84900834298
-
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program
-
San Francisco, CA. September
-
KARAMI, M., GHAEMI, S., AND MCCOY, D. Folex: An Analysis of an Herbal and Counterfeit Luxury Goods Affiliate Program. In Proceesings of the eCrime Researchers Summit (eCRS) (San Francisco, CA., September 2013).
-
(2013)
Proceesings of the ECrime Researchers Summit (ECRS)
-
-
Karami, M.1
Ghaemi, S.2
McCoy, D.3
-
18
-
-
84879759416
-
Pick your poison: Pricing and inventories at unlicensed online pharmacies
-
Philadelphia, PA. June
-
LEONTIADIS, N., MOORE, T., AND CHRISTIN, N. Pick Your Poison: Pricing and Inventories at Unlicensed Online Pharmacies. In Proceedings of the ACM Conference on Electronic Commerce (Philadelphia, PA., June 2013).
-
(2013)
Proceedings of the ACM Conference on Electronic Commerce
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
19
-
-
84910154693
-
A nearly four-year longitudinal study of search-engine poisoning
-
Scottsdale, AZ, Nov
-
LEONTIADIS, N., MOORE, T., AND CHRISTIN, N. A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning. In Proceedings of the ACM Conference on Computer and Communications Security (Scottsdale, AZ, Nov. 2014).
-
(2014)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
20
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, CA, May
-
LEVCHENKO, K., PITSILLIDIS, A., CHACHRA, N., ENRIGHT, B., FÉLEGYHÁZI, M., GRIER, C., HALVORSON, T., KANICH, C., KREIBICH, C., LIU, H., MCCOY, D., WEAVER, N., PAXSON, V., VOELKER, G. M., AND SAVAGE, S. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of the IEEE Symposium and Security and Privacy (Oakland, CA, May 2011).
-
(2011)
Proceedings of the IEEE Symposium and Security and Privacy
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Félegyházi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
Mccoy, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
21
-
-
85084094479
-
On the effects of registrar-level intervention
-
Boston, MA, March
-
LIU, H., LEVCHENKO, K., FELEGYHAZI, M., KREIBICH, C., MAIER, G., VOELKER, G. M., AND SAVAGE, S. On the Effects of Registrar-level Intervention. In Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET) (Boston, MA, March 2011).
-
(2011)
Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET)
-
-
Liu, H.1
Levchenko, K.2
Felegyhazi, M.3
Kreibich, C.4
Maier, G.5
Voelker, G.M.6
Savage, S.7
-
22
-
-
80755169472
-
Surf: Detecting and measuring search poisoning
-
Chicago, IL, October
-
LU, L., PERDISCI, R., AND LEE, W. SURF: Detecting and Measuring Search Poisoning. In Proceedings of the ACM Conference on Computer and Communications Security (Chicago, IL, October 2011).
-
(2011)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Lu, L.1
Perdisci, R.2
Lee, W.3
-
24
-
-
84869463505
-
Priceless: The role of payments in abuse-advertised goods
-
Raleigh, NC, October
-
MCCOY, D., DHARMDASANI, H., KREIBICH, C., VOELKER, G. M., AND SAVAGE, S. Priceless: The Role of Payments in Abuse-advertised Goods. In Proceedings of the ACM Conference on Computer and Communications Security (Raleigh, NC, October 2012).
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
McCoy, D.1
Dharmdasani, H.2
Kreibich, C.3
Voelker, G.M.4
Savage, S.5
-
25
-
-
84900789776
-
Pharma leaks: Understanding the business of online pharmaceutical affiliate programs
-
Bellevue, WA, August
-
MCCOY, D., PITSILLIDIS, A., JORDAN, G., WEAVER, N., KREIBICH, C., KREBS, B., VOELKER, G. M., SAVAGE, S., AND LEVCHENKO, K. Pharma Leaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In Proceedings of the USENIX Security Symposium (Bellevue, WA, August 2012).
-
(2012)
Proceedings of the USENIX Security Symposium
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Weaver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G.M.7
Savage, S.8
Levchenko, K.9
-
27
-
-
80755144007
-
Fashion crimes: Trending-term exploitation on the web
-
Chicago, IL, October
-
MOORE, T., LEONTIADIS, N., AND CHRISTIN, N. Fashion Crimes: Trending-Term Exploitation on the Web. In Proceedings of the ACM Conference on Computer and Communications Security (Chicago, IL, October 2011).
-
(2011)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Moore, T.1
Leontiadis, N.2
Christin, N.3
-
29
-
-
79952353977
-
-
PRICEWATERHOUSECOOPERS., Full Year Results
-
PRICEWATERHOUSECOOPERS. IAB Internet Advertising Revenue Report, 2012 Full Year Results. http://www.iab.net/media/file/IABInternetAdvertisingRevenueReportFY2012POSTED.pdf.
-
(2012)
IAB Internet Advertising Revenue Report
-
-
-
30
-
-
85084096558
-
The nocebo effect on the web: An analysis of fake anti-virus distribution
-
San Jose, CA, April
-
RAJAB, M. A., BALLARD, L., MARVROMMATIS, P., PROVOS, N., AND ZHAO, X. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET) (San Jose, CA, April 2010).
-
(2010)
Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET)
-
-
Rajab, M.A.1
Ballard, L.2
Marvrommatis, P.3
Provos, N.4
Zhao, X.5
-
31
-
-
84910122495
-
-
SAFENAMES. Mark Protect. http://www.safenames.net/BrandProtection/MarkProtect.aspx.
-
Mark Protect
-
-
-
33
-
-
84910142484
-
-
SMGPA. http://smgpa.net/.
-
SMGPA
-
-
-
34
-
-
84869407868
-
The underground economy of fake antivirus software
-
Washington D.C
-
STONE-GROSS, B., ABMAN, R., KEMMERER, R., KRUEGEL, C., STEIGERWALD, D., AND VIGNA, G. The Underground Economy of Fake Antivirus Software. In Proc. of the 10th Workshop on the Economics of Information Security (WEIS) (Washington D.C., 2011).
-
(2011)
Proc. of the 10th Workshop on the Economics of Information Security (WEIS)
-
-
Stone-gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
35
-
-
80755187795
-
Cloak and dagger: Dynamics of web search cloaking
-
Chicago, IL, October
-
WANG, D. Y., SAVAGE, S., AND VOELKER, G. M. Cloak and Dagger: Dynamics of Web Search Cloaking. In Proceedings of the ACM Conference on Computer and Communications Security (Chicago, IL, October 2011).
-
(2011)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Wang, D.Y.1
Savage, S.2
Voelker, G.M.3
-
36
-
-
85074786935
-
Juice: A longitudinal study of an SEO campaign
-
San Diego, CA, February
-
WANG, D. Y., SAVAGE, S., AND VOELKER, G. M. Juice: A Longitudinal Study of an SEO Campaign. In Proceedings of the Network and Distributed System Security Symposium (San Diego, CA, February 2013).
-
(2013)
Proceedings of the Network and Distributed System Security Symposium
-
-
Wang, D.Y.1
Savage, S.2
Voelker, G.M.3
-
37
-
-
35348904515
-
Spam double-funnel: Connecting web spammers with advertisers
-
Banff, Alberta, May
-
WANG, Y.-M., MA, M., NIU, Y., AND CHEN, H. Spam Double-Funnel: Connecting Web Spammers with Advertisers. In Proceedings of the International World Wide Web Conference (WWW) (Banff, Alberta, May 2007).
-
(2007)
Proceedings of the International World Wide Web Conference (WWW)
-
-
Wang, Y.-M.1
Ma, M.2
Niu, Y.3
Chen, H.4
-
38
-
-
85006397404
-
Large-scale automatic classification of phishing pages
-
San Diego, CA, February
-
WHITTAKER, C., RYNER, B., AND NAZIF, M. Large-Scale Automatic Classification of Phishing Pages. In Proceedings of the Network and Distributed System Security Symposium (San Diego, CA, February 2010).
-
(2010)
Proceedings of the Network and Distributed System Security Symposium
-
-
Whittaker, C.1
Ryner, B.2
Nazif, M.3
|