BibTeX records: Kurt Thomas

download as .bib file

@inproceedings{DBLP:conf/chi/WeiCKKRT23,
  author       = {Miranda Wei and
                  Sunny Consolvo and
                  Patrick Gage Kelley and
                  Tadayoshi Kohno and
                  Franziska Roesner and
                  Kurt Thomas},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {"There's so much responsibility on users right now: " Expert
                  Advice for Staying Safer From Hate and Harassment},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {190:1--190:17},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3581229},
  doi          = {10.1145/3544548.3581229},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/WeiCKKRT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/FreedBCHKTC23,
  author       = {Diana Freed and
                  Natalie N. Bazarova and
                  Sunny Consolvo and
                  Eunice J. Han and
                  Patrick Gage Kelley and
                  Kurt Thomas and
                  Dan Cosley},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {Understanding Digital-Safety Experiences of Youth in the {U.S}},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {191:1--191:15},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3581128},
  doi          = {10.1145/3544548.3581128},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/FreedBCHKTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/KelleyCHJSTYW23,
  author       = {Patrick Gage Kelley and
                  Celestina Cornejo and
                  Lisa Hayes and
                  Ellie Shuo Jin and
                  Aaron Sedley and
                  Kurt Thomas and
                  Yongwei Yang and
                  Allison Woodruff},
  editor       = {Patrick Gage Kelley and
                  Apu Kapadia},
  title        = {"There will be less privacy, of course": How and why people
                  in 10 countries expect {AI} will affect privacy in the future},
  booktitle    = {Nineteenth Symposium on Usable Privacy and Security, {SOUPS} 2023,
                  Anaheim, CA, USA, August 5-7, 2023},
  pages        = {579--603},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/soups2023/presentation/kelley},
  timestamp    = {Wed, 09 Aug 2023 15:04:34 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/KelleyCHJSTYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SamermitTKMWCT23,
  author       = {Patrawat Samermit and
                  Anna Turner and
                  Patrick Gage Kelley and
                  Tara Matthews and
                  Vanessia Wu and
                  Sunny Consolvo and
                  Kurt Thomas},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {"Millions of people are watching you": Understanding the
                  Digital-Safety Needs and Practices of Creators},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5629--5645},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/samermit},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SamermitTKMWCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/0006HTD23,
  author       = {Deepak Kumar and
                  Jeff T. Hancock and
                  Kurt Thomas and
                  Zakir Durumeric},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Understanding the Behaviors of Toxic Accounts on Reddit},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2797--2807},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583522},
  doi          = {10.1145/3543507.3583522},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/0006HTD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-08057,
  author       = {Miranda Wei and
                  Sunny Consolvo and
                  Patrick Gage Kelley and
                  Tadayoshi Kohno and
                  Franziska Roesner and
                  Kurt Thomas},
  title        = {"There's so much responsibility on users right now: " Expert
                  Advice for Staying Safer From Hate and Harassment},
  journal      = {CoRR},
  volume       = {abs/2302.08057},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.08057},
  doi          = {10.48550/ARXIV.2302.08057},
  eprinttype    = {arXiv},
  eprint       = {2302.08057},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-08057.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-10149,
  author       = {Nicholas Carlini and
                  Matthew Jagielski and
                  Christopher A. Choquette{-}Choo and
                  Daniel Paleka and
                  Will Pearce and
                  Hyrum Anderson and
                  Andreas Terzis and
                  Kurt Thomas and
                  Florian Tram{\`{e}}r},
  title        = {Poisoning Web-Scale Training Datasets is Practical},
  journal      = {CoRR},
  volume       = {abs/2302.10149},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.10149},
  doi          = {10.48550/ARXIV.2302.10149},
  eprinttype    = {arXiv},
  eprint       = {2302.10149},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-10149.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-02810,
  author       = {Kurt Thomas and
                  Sarah Meiklejohn and
                  Michael A. Specter and
                  Xiang Wang and
                  Xavier Llor{\`{a}} and
                  Stephan Somogyi and
                  David Kleidermacher},
  title        = {Robust, privacy-preserving, transparent, and auditable on-device blocklisting},
  journal      = {CoRR},
  volume       = {abs/2304.02810},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.02810},
  doi          = {10.48550/ARXIV.2304.02810},
  eprinttype    = {arXiv},
  eprint       = {2304.02810},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-02810.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ThomasKCSB22,
  author       = {Kurt Thomas and
                  Patrick Gage Kelley and
                  Sunny Consolvo and
                  Patrawat Samermit and
                  Elie Bursztein},
  editor       = {Simone D. J. Barbosa and
                  Cliff Lampe and
                  Caroline Appert and
                  David A. Shamma and
                  Steven Mark Drucker and
                  Julie R. Williamson and
                  Koji Yatani},
  title        = {"It's common and a part of being a content creator": Understanding
                  How Creators Experience and Cope with Hate and Harassment Online},
  booktitle    = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems,
                  New Orleans, LA, USA, 29 April 2022 - 5 May 2022},
  pages        = {121:1--121:15},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491102.3501879},
  doi          = {10.1145/3491102.3501879},
  timestamp    = {Fri, 29 Apr 2022 13:37:13 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/ThomasKCSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WarfordMYACKMMS22,
  author       = {Noel Warford and
                  Tara Matthews and
                  Kaitlyn Yang and
                  Omer Akgul and
                  Sunny Consolvo and
                  Patrick Gage Kelley and
                  Nathan Malkin and
                  Michelle L. Mazurek and
                  Manya Sleeper and
                  Kurt Thomas},
  title        = {SoK: {A} Framework for Unifying At-Risk User Research},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {2344--2360},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833643},
  doi          = {10.1109/SP46214.2022.9833643},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WarfordMYACKMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2022,
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22},
  isbn         = {978-1-939133-31-1},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-02533,
  author       = {Deepak Kumar and
                  Jeff T. Hancock and
                  Kurt Thomas and
                  Zakir Durumeric},
  title        = {Understanding Longitudinal Behaviors of Toxic Accounts on Reddit},
  journal      = {CoRR},
  volume       = {abs/2209.02533},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.02533},
  doi          = {10.48550/ARXIV.2209.02533},
  eprinttype    = {arXiv},
  eprint       = {2209.02533},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-02533.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/0006KCMBDTB21,
  author       = {Deepak Kumar and
                  Patrick Gage Kelley and
                  Sunny Consolvo and
                  Joshua Mason and
                  Elie Bursztein and
                  Zakir Durumeric and
                  Kurt Thomas and
                  Michael D. Bailey},
  editor       = {Sonia Chiasson},
  title        = {Designing Toxic Content Classification for a Diversity of Perspectives},
  booktitle    = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021,
                  August 8-10, 2021},
  pages        = {299--318},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/soups2021/presentation/kumar},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/0006KCMBDTB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasABBBCDDKK21,
  author       = {Kurt Thomas and
                  Devdatta Akhawe and
                  Michael D. Bailey and
                  Dan Boneh and
                  Elie Bursztein and
                  Sunny Consolvo and
                  Nicola Dell and
                  Zakir Durumeric and
                  Patrick Gage Kelley and
                  Deepak Kumar and
                  Damon McCoy and
                  Sarah Meiklejohn and
                  Thomas Ristenpart and
                  Gianluca Stringhini},
  title        = {SoK: Hate, Harassment, and the Changing Landscape of Online Abuse},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {247--267},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00028},
  doi          = {10.1109/SP40001.2021.00028},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasABBBCDDKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ConsolvoKMTDB21,
  author       = {Sunny Consolvo and
                  Patrick Gage Kelley and
                  Tara Matthews and
                  Kurt Thomas and
                  Lee Dunn and
                  Elie Bursztein},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {"Why wouldn't someone think of democracy as a target?":
                  Security practices {\&} challenges of people involved with {U.S.}
                  political campaigns},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1181--1198},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/consolvo},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ConsolvoKMTDB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-00236,
  author       = {Sunny Consolvo and
                  Patrick Gage Kelley and
                  Tara Matthews and
                  Kurt Thomas and
                  Lee Dunn and
                  Elie Bursztein},
  title        = {"Why wouldn't someone think of democracy as a target?":
                  Security practices {\&} challenges of people involved with {U.S.}
                  political campaigns},
  journal      = {CoRR},
  volume       = {abs/2106.00236},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.00236},
  eprinttype    = {arXiv},
  eprint       = {2106.00236},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-00236.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-04511,
  author       = {Deepak Kumar and
                  Patrick Gage Kelley and
                  Sunny Consolvo and
                  Joshua Mason and
                  Elie Bursztein and
                  Zakir Durumeric and
                  Kurt Thomas and
                  Michael D. Bailey},
  title        = {Designing Toxic Content Classification for a Diversity of Perspectives},
  journal      = {CoRR},
  volume       = {abs/2106.04511},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.04511},
  eprinttype    = {arXiv},
  eprint       = {2106.04511},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-04511.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-07047,
  author       = {Noel Warford and
                  Tara Matthews and
                  Kaitlyn Yang and
                  Omer Akgul and
                  Sunny Consolvo and
                  Patrick Gage Kelley and
                  Nathan Malkin and
                  Michelle L. Mazurek and
                  Manya Sleeper and
                  Kurt Thomas},
  title        = {SoK: {A} Framework for Unifying At-Risk User Research},
  journal      = {CoRR},
  volume       = {abs/2112.07047},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.07047},
  eprinttype    = {arXiv},
  eprint       = {2112.07047},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-07047.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SimoiuZTB20,
  author       = {Camelia Simoiu and
                  Ali Zand and
                  Kurt Thomas and
                  Elie Bursztein},
  title        = {Who is targeted by email-based phishing and malware?: Measuring factors
                  that differentiate risk},
  booktitle    = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  October 27-29, 2020},
  pages        = {567--576},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419394.3423617},
  doi          = {10.1145/3419394.3423617},
  timestamp    = {Tue, 27 Oct 2020 07:41:23 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/SimoiuZTB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OestZWNBZTDA20,
  author       = {Adam Oest and
                  Penghui Zhang and
                  Brad Wardman and
                  Eric Nunes and
                  Jakub Burgis and
                  Ali Zand and
                  Kurt Thomas and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness
                  of Phishing Attacks at Scale},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {361--377},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/oest-sunrise},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OestZWNBZTDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SambasivanABBCG19,
  author       = {Nithya Sambasivan and
                  Nova Ahmed and
                  Amna Batool and
                  Elie Bursztein and
                  Elizabeth F. Churchill and
                  Laura Sanely Gayt{\'{a}}n{-}Lugo and
                  Tara Matthews and
                  David Nemer and
                  Kurt Thomas and
                  Sunny Consolvo},
  title        = {Toward Gender-Equitable Privacy and Security in South Asia},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {71--77},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2912727},
  doi          = {10.1109/MSEC.2019.2912727},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SambasivanABBCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertramBCCFFGHH19,
  author       = {Theo Bertram and
                  Elie Bursztein and
                  Stephanie Caro and
                  Hubert Chao and
                  Rutledge Chin Feman and
                  Peter Fleischer and
                  Albin Gustafsson and
                  Jess Hemerly and
                  Chris Hibbert and
                  Luca Invernizzi and
                  Lanah Kammourieh Donnelly and
                  Jason Ketover and
                  Jay Laefer and
                  Paul Nicholas and
                  Yuan Niu and
                  Harjinder Obhi and
                  David Price and
                  Andrew Strait and
                  Kurt Thomas and
                  Al Verney},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Five Years of the Right to be Forgotten},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {959--972},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354208},
  doi          = {10.1145/3319535.3354208},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertramBCCFFGHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/SambasivanBAMTG19,
  author       = {Nithya Sambasivan and
                  Amna Batool and
                  Nova Ahmed and
                  Tara Matthews and
                  Kurt Thomas and
                  Laura Sanely Gayt{\'{a}}n{-}Lugo and
                  David Nemer and
                  Elie Bursztein and
                  Elizabeth F. Churchill and
                  Sunny Consolvo},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {"They Don't Leave Us Alone Anywhere We Go": Gender and Digital
                  Abuse in South Asia},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300232},
  doi          = {10.1145/3290605.3300232},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/SambasivanBAMTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasPYRKIBPPB19,
  author       = {Kurt Thomas and
                  Jennifer Pullman and
                  Kevin Yeo and
                  Ananth Raghunathan and
                  Patrick Gage Kelley and
                  Luca Invernizzi and
                  Borbala Benko and
                  Tadek Pietraszek and
                  Sarvar Patel and
                  Dan Boneh and
                  Elie Bursztein},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Protecting accounts from credential stuffing with password breach
                  alerting},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1556--1571},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/thomas},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasPYRKIBPPB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/DoerflerTMRJMM19,
  author       = {Periwinkle Doerfler and
                  Kurt Thomas and
                  Maija Marincenko and
                  Juri Ranieri and
                  Yu Jiang and
                  Angelika Moscicki and
                  Damon McCoy},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Evaluating Login Challenges as aDefense Against Account Takeover},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {372--382},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313481},
  doi          = {10.1145/3308558.3313481},
  timestamp    = {Sun, 22 Sep 2019 18:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/www/DoerflerTMRJMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MirianDSVT19,
  author       = {Ariana Mirian and
                  Joe DeBlasio and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  Kurt Thomas},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Hack for Hire: Exploring the Emerging Market for Account Hijacking},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {1279--1289},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313489},
  doi          = {10.1145/3308558.3313489},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MirianDSVT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BurszteinCDEHOS19,
  author       = {Elie Bursztein and
                  Einat Clarke and
                  Michelle DeLaune and
                  David M. Elifff and
                  Nick Hsu and
                  Lindsey Olson and
                  John Shehan and
                  Madhukar Thakur and
                  Kurt Thomas and
                  Travis Bright},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Rethinking the Detection of Child Sexual Abuse Imagery on the Internet},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {2601--2607},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313482},
  doi          = {10.1145/3308558.3313482},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/BurszteinCDEHOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GaoWGKTM18,
  author       = {Peng Gao and
                  Binghui Wang and
                  Neil Zhenqiang Gong and
                  Sanjeev R. Kulkarni and
                  Kurt Thomas and
                  Prateek Mittal},
  title        = {{SYBILFUSE:} Combining Local Attributes with Global Structure to Perform
                  Robust Sybil Detection},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433147},
  doi          = {10.1109/CNS.2018.8433147},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GaoWGKTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/KarunakaranTBC18,
  author       = {Sowmya Karunakaran and
                  Kurt Thomas and
                  Elie Bursztein and
                  Oxana Comanescu},
  editor       = {Mary Ellen Zurko and
                  Heather Richter Lipford},
  title        = {Data Breaches: User Comprehension, Expectations, and Concerns with
                  Handling Exposed Data},
  booktitle    = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018,
                  Baltimore, MD, USA, August 12-14, 2018},
  pages        = {217--234},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/soups2018/presentation/karunakaran},
  timestamp    = {Mon, 01 Feb 2021 08:41:57 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/KarunakaranTBC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-06772,
  author       = {Peng Gao and
                  Binghui Wang and
                  Neil Zhenqiang Gong and
                  Sanjeev R. Kulkarni and
                  Kurt Thomas and
                  Prateek Mittal},
  title        = {SybilFuse: Combining Local Attributes with Global Structure to Perform
                  Robust Sybil Detection},
  journal      = {CoRR},
  volume       = {abs/1803.06772},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.06772},
  eprinttype    = {arXiv},
  eprint       = {1803.06772},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-06772.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasLZBRIMCEM17,
  author       = {Kurt Thomas and
                  Frank Li and
                  Ali Zand and
                  Jacob Barrett and
                  Juri Ranieri and
                  Luca Invernizzi and
                  Yarik Markov and
                  Oxana Comanescu and
                  Vijay Eranti and
                  Angelika Moscicki and
                  Daniel Margolis and
                  Vern Paxson and
                  Elie Bursztein},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen
                  Credentials},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1421--1434},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134067},
  doi          = {10.1145/3133956.3134067},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ThomasLZBRIMCEM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AntonakakisABBB17,
  author       = {Manos Antonakakis and
                  Tim April and
                  Michael D. Bailey and
                  Matt Bernhard and
                  Elie Bursztein and
                  Jaime Cochran and
                  Zakir Durumeric and
                  J. Alex Halderman and
                  Luca Invernizzi and
                  Michalis Kallitsis and
                  Deepak Kumar and
                  Chaz Lever and
                  Zane Ma and
                  Joshua Mason and
                  Damian Menscher and
                  Chad Seaman and
                  Nick Sullivan and
                  Kurt Thomas and
                  Yi Zhou},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Understanding the Mirai Botnet},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1093--1110},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AntonakakisABBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/HuangGTKBLS17,
  author       = {Danny Yuxing Huang and
                  Doug Grundman and
                  Kurt Thomas and
                  Abhishek Kumar and
                  Elie Bursztein and
                  Kirill Levchenko and
                  Alex C. Snoeren},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {Pinning Down Abuse on Google Maps},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {1471--1479},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052590},
  doi          = {10.1145/3038912.3052590},
  timestamp    = {Tue, 06 Nov 2018 16:57:07 +0100},
  biburl       = {https://dblp.org/rec/conf/www/HuangGTKBLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BurszteinMPT16,
  author       = {Elie Bursztein and
                  Artem Malyshev and
                  Tadek Pietraszek and
                  Kurt Thomas},
  editor       = {Long Lu and
                  Mohammad Mannan},
  title        = {Picasso: Lightweight Device Class Fingerprinting for Web Clients},
  booktitle    = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994467},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BurszteinMPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ThomasABFHBBB16,
  author       = {Kurt Thomas and
                  Rony Amira and
                  Adi Ben{-}Yoash and
                  Ori Folger and
                  Amir Hardon and
                  Ari Berger and
                  Elie Bursztein and
                  Michael D. Bailey},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {143--164},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_7},
  doi          = {10.1007/978-3-319-45719-2\_7},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ThomasABFHBBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/InvernizziTKCPB16,
  author       = {Luca Invernizzi and
                  Kurt Thomas and
                  Alexandros Kapravelos and
                  Oxana Comanescu and
                  Jean Michel Picod and
                  Elie Bursztein},
  title        = {Cloak of Visibility: Detecting When Machines Browse a Different Web},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {743--758},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.50},
  doi          = {10.1109/SP.2016.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/InvernizziTKCPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasCRPPDSTTC16,
  author       = {Kurt Thomas and
                  Juan A. Elices Crespo and
                  Ryan Rasti and
                  Jean Michel Picod and
                  Cait Phillips and
                  Marc{-}Andr{\'{e}} Decoste and
                  Chris Sharp and
                  Fabio Tirelo and
                  Ali Tofigh and
                  Marc{-}Antoine Courteau and
                  Lucas Ballard and
                  Robert Shield and
                  Nav Jagpal and
                  Moheeb Abu Rajab and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Elie Bursztein and
                  Damon McCoy},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Investigating Commercial Pay-Per-Install and the Distribution of Unwanted
                  Software},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {721--739},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/thomas},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasCRPPDSTTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiHKNBTBP16,
  author       = {Frank Li and
                  Grant Ho and
                  Eric Kuan and
                  Yuan Niu and
                  Lucas Ballard and
                  Kurt Thomas and
                  Elie Bursztein and
                  Vern Paxson},
  editor       = {Jacqueline Bourdeau and
                  Jim Hendler and
                  Roger Nkambou and
                  Ian Horrocks and
                  Ben Y. Zhao},
  title        = {Remedying Web Hijacking: Notification Effectiveness and Webmaster
                  Comprehension},
  booktitle    = {Proceedings of the 25th International Conference on World Wide Web,
                  {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  pages        = {1009--1019},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872427.2883039},
  doi          = {10.1145/2872427.2883039},
  timestamp    = {Tue, 12 Apr 2022 14:46:29 +0200},
  biburl       = {https://dblp.org/rec/conf/www/LiHKNBTBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DurumericAMKBLT15,
  author       = {Zakir Durumeric and
                  David Adrian and
                  Ariana Mirian and
                  James Kasten and
                  Elie Bursztein and
                  Nicolas Lidzborski and
                  Kurt Thomas and
                  Vijay Eranti and
                  Michael D. Bailey and
                  J. Alex Halderman},
  editor       = {Kenjiro Cho and
                  Kensuke Fukuda and
                  Vivek S. Pai and
                  Neil Spring},
  title        = {Neither Snow Nor Rain Nor {MITM...:} An Empirical Analysis of Email
                  Delivery Security},
  booktitle    = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
                  2015, Tokyo, Japan, October 28-30, 2015},
  pages        = {27--39},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815675.2815695},
  doi          = {10.1145/2815675.2815695},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/DurumericAMKBLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasBGHJKMNPP15,
  author       = {Kurt Thomas and
                  Elie Bursztein and
                  Chris Grier and
                  Grant Ho and
                  Nav Jagpal and
                  Alexandros Kapravelos and
                  Damon McCoy and
                  Antonio Nappa and
                  Vern Paxson and
                  Paul Pearce and
                  Niels Provos and
                  Moheeb Abu Rajab},
  title        = {Ad Injection at Scale: Assessing Deceptive Advertisement Modifications},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {151--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.17},
  doi          = {10.1109/SP.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasBGHJKMNPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JagpalDGMPRT15,
  author       = {Nav Jagpal and
                  Eric Dingle and
                  Jean{-}Philippe Gravel and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Moheeb Abu Rajab and
                  Kurt Thomas},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Trends and Lessons from Three Years Fighting Malicious Extensions},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {579--593},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/jagpal},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JagpalDGMPRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/ThomasHWBGHKMSV15,
  author       = {Kurt Thomas and
                  Danny Yuxing Huang and
                  David Y. Wang and
                  Elie Bursztein and
                  Chris Grier and
                  Tom Holt and
                  Christopher Kruegel and
                  Damon McCoy and
                  Stefan Savage and
                  Giovanni Vigna},
  title        = {Framing Dependencies Introduced by Underground Commoditization},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_thomas.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/ThomasHWBGHKMSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GaoGKTM15,
  author       = {Peng Gao and
                  Neil Zhenqiang Gong and
                  Sanjeev R. Kulkarni and
                  Kurt Thomas and
                  Prateek Mittal},
  title        = {SybilFrame: {A} Defense-in-Depth Framework for Structure-Based Sybil
                  Detection},
  journal      = {CoRR},
  volume       = {abs/1503.02985},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.02985},
  eprinttype    = {arXiv},
  eprint       = {1503.02985},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GaoGKTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasIBPGM14,
  author       = {Kurt Thomas and
                  Dmytro Iatskiv and
                  Elie Bursztein and
                  Tadek Pietraszek and
                  Chris Grier and
                  Damon McCoy},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Dialing Back Abuse on Phone Verified Accounts},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {465--476},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660321},
  doi          = {10.1145/2660267.2660321},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThomasIBPGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasLGP14,
  author       = {Kurt Thomas and
                  Frank Li and
                  Chris Grier and
                  Vern Paxson},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Consequences of Connectivity: Characterizing Account Hijacking on
                  Twitter},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {489--500},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660282},
  doi          = {10.1145/2660267.2660282},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThomasLGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Thomas13,
  author       = {Kurt Thomas},
  title        = {The Role of the Underground Economy in Social Network Spam and Abuse},
  school       = {University of California, Berkeley, {USA}},
  year         = {2013},
  url          = {https://www.escholarship.org/uc/item/1cs1x8pw},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Thomas13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaxsonCJRSSSTVW13,
  author       = {Vern Paxson and
                  Mihai Christodorescu and
                  Mobin Javed and
                  Josyula R. Rao and
                  Reiner Sailer and
                  Douglas Lee Schales and
                  Marc Ph. Stoecklin and
                  Kurt Thomas and
                  Wietse Z. Venema and
                  Nicholas Weaver},
  editor       = {Samuel T. King},
  title        = {Practical Comprehensive Bounds on Surreptitious Communication over
                  {DNS}},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {17--32},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/paxson},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PaxsonCJRSSSTVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasMGKP13,
  author       = {Kurt Thomas and
                  Damon McCoy and
                  Chris Grier and
                  Alek Kolcz and
                  Vern Paxson},
  editor       = {Samuel T. King},
  title        = {Trafficking Fraudulent Accounts: The Role of the Underground Market
                  in Twitter Spam and Abuse},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {195--210},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/thomas},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasMGKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12,
  author       = {Chris Grier and
                  Lucas Ballard and
                  Juan Caballero and
                  Neha Chachra and
                  Christian J. Dietrich and
                  Kirill Levchenko and
                  Panayiotis Mavrommatis and
                  Damon McCoy and
                  Antonio Nappa and
                  Andreas Pitsillidis and
                  Niels Provos and
                  M. Zubair Rafique and
                  Moheeb Abu Rajab and
                  Christian Rossow and
                  Kurt Thomas and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Manufacturing compromise: the emergence of exploit-as-a-service},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {821--832},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382283},
  doi          = {10.1145/2382196.2382283},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ThomasGP12,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Vern Paxson},
  editor       = {Engin Kirda},
  title        = {Adapting Social Spam Infrastructure for Political Censorship},
  booktitle    = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '12, San Jose, CA, USA, April 24, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/leet12/workshop-program/presentation/thomas},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/ThomasGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ThomasGSP11,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Dawn Song and
                  Vern Paxson},
  editor       = {Patrick Thiran and
                  Walter Willinger},
  title        = {Suspended accounts in retrospect: an analysis of twitter spam},
  booktitle    = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages        = {243--258},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2068816.2068840},
  doi          = {10.1145/2068816.2068840},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/ThomasGSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasGMPS11,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Justin Ma and
                  Vern Paxson and
                  Dawn Song},
  title        = {Design and Evaluation of a Real-Time {URL} Spam Filtering Service},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {447--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.25},
  doi          = {10.1109/SP.2011.25},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasGMPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierTPZ10,
  author       = {Chris Grier and
                  Kurt Thomas and
                  Vern Paxson and
                  Chao Michael Zhang},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {@spam: the underground on 140 characters or less},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {27--37},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866311},
  doi          = {10.1145/1866307.1866311},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GrierTPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ThomasN10,
  author       = {Kurt Thomas and
                  David M. Nicol},
  title        = {The Koobface botnet and the rise of social malware},
  booktitle    = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2010, Nancy, France, October 19-20, 2010},
  pages        = {63--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MALWARE.2010.5665793},
  doi          = {10.1109/MALWARE.2010.5665793},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ThomasN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ThomasGN10,
  author       = {Kurt Thomas and
                  Chris Grier and
                  David M. Nicol},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {unFriendly: Multi-party Privacy Risks in Social Networks},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {236--252},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_14},
  doi          = {10.1007/978-3-642-14527-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ThomasGN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics