@ spam: the underground on 140 characters or less C Grier, K Thomas, V Paxson, M Zhang Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 717 | 2010 |
Design and evaluation of a real-time url spam filtering service K Thomas, C Grier, J Ma, V Paxson, D Song 2011 IEEE symposium on security and privacy, 447-462, 2011 | 549 | 2011 |
Suspended accounts in retrospect: an analysis of twitter spam K Thomas, C Grier, D Song, V Paxson Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 543 | 2011 |
Designing and Implementing Malicious Hardware. ST King, J Tucek, A Cozzie, C Grier, W Jiang, Y Zhou Leet 8, 1-8, 2008 | 385 | 2008 |
Measuring pay-per-install: the commoditization of malware distribution. J Caballero, C Grier, C Kreibich, V Paxson Usenix security symposium 13, 2011 | 342 | 2011 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 326 | 2011 |
Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse K Thomas, D McCoy, C Grier, A Kolcz, V Paxson 22nd {USENIX} Security Symposium ({USENIX} Security 13), 195-210, 2013 | 285 | 2013 |
Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 258 | 2012 |
Secure web browsing with the OP web browser C Grier, S Tang, ST King 2008 IEEE Symposium on Security and Privacy (sp 2008), 402-416, 2008 | 247 | 2008 |
The Multi-Principal OS Construction of the Gazelle Web Browser. HJ Wang, C Grier, A Moshchuk, ST King, P Choudhury, H Venter USENIX security symposium 28, 2009 | 238 | 2009 |
SCADA cyber security testbed development CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol 2006 38th North American Power Symposium, 483-488, 2006 | 224 | 2006 |
Prudent practices for designing malware experiments: Status quo and outlook C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ... 2012 IEEE Symposium on Security and Privacy, 65-79, 2012 | 212 | 2012 |
unfriendly: Multi-party privacy risks in social networks K Thomas, C Grier, DM Nicol International Symposium on Privacy Enhancing Technologies Symposium, 236-252, 2010 | 152 | 2010 |
Hulk: Eliciting malicious behavior in browser extensions A Kapravelos, C Grier, N Chachra, C Kruegel, G Vigna, V Paxson 23rd {USENIX} Security Symposium ({USENIX} Security 14), 641-654, 2014 | 146 | 2014 |
Insights from the Inside: A View of Botnet Management from Infiltration. CY Cho, J Caballero, C Grier, V Paxson, D Song LEET 10, 1-1, 2010 | 113 | 2010 |
Framing dependencies introduced by underground commoditization K Thomas, D Huang, D Wang, E Bursztein, C Grier, TJ Holt, C Kruegel, ... | 110 | 2015 |
Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 109 | 2015 |
What’s clicking what? techniques and innovations of today’s clickbots B Miller, P Pearce, C Grier, C Kreibich, V Paxson International Conference on Detection of Intrusions and Malware, and …, 2011 | 105 | 2011 |
Adapting social spam infrastructure for political censorship K Thomas, C Grier, V Paxson 5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 12), 2012 | 99 | 2012 |
Understanding the domain registration behavior of spammers S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ... Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013 | 98 | 2013 |