Chris Grier
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2015
[c26]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167
[c25]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015- 2014
[c24]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. ACM Conference on Computer and Communications Security 2014: 141-152
[c23]Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy:
Dialing Back Abuse on Phone Verified Accounts. ACM Conference on Computer and Communications Security 2014: 465-476
[c22]Kurt Thomas, Frank Li, Chris Grier, Vern Paxson:
Consequences of Connectivity: Characterizing Account Hijacking on Twitter. ACM Conference on Computer and Communications Security 2014: 489-500
[c21]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014
[c20]Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson:
Hulk: Eliciting Malicious Behavior in Browser Extensions. USENIX Security Symposium 2014: 641-654- 2013
[c19]Shuang Hao, Matthew Thomas, Vern Paxson, Nick Feamster, Christian Kreibich, Chris Grier, Scott Hollenbeck:
Understanding the domain registration behavior of spammers. Internet Measurement Conference 2013: 63-76
[c18]Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. USENIX Security Symposium 2013: 195-210- 2012
[c17]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. ACM Conference on Computer and Communications Security 2012: 821-832
[c16]Kurt Thomas, Chris Grier, Vern Paxson:
Adapting Social Spam Infrastructure for Political Censorship. LEET 2012
[c15]Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen:
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. IEEE Symposium on Security and Privacy 2012: 65-79- 2011
[j2]Chris Grier, Shuo Tang, Samuel T. King:
Designing and Implementing the OP and OP2 Web Browsers. TWEB 5(2): 11:1-11:35 (2011)
[c14]Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson:
What's Clicking What? Techniques and Innovations of Today's Clickbots. DIMVA 2011: 164-183
[c13]Kurt Thomas, Chris Grier, Dawn Song, Vern Paxson:
Suspended accounts in retrospect: an analysis of twitter spam. Internet Measurement Conference 2011: 243-258
[c12]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446
[c11]Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song:
Design and Evaluation of a Real-Time URL Spam Filtering Service. IEEE Symposium on Security and Privacy 2011: 447-462
[c10]Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson:
Measuring Pay-per-Install: The Commoditization of Malware Distribution. USENIX Security Symposium 2011
[c9]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011- 2010
[c8]Chris Grier, Kurt Thomas, Vern Paxson, Chao Michael Zhang:
@spam: the underground on 140 characters or less. ACM Conference on Computer and Communications Security 2010: 27-37
[c7]Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song:
Insights from the Inside: A View of Botnet Management from Infiltration. LEET 2010
[c6]Kurt Thomas, Chris Grier, David M. Nicol:
unFriendly: Multi-party Privacy Risks in Social Networks. Privacy Enhancing Technologies 2010: 236-252
[c5]Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King:
Alhambra: a system for creating, enforcing, and testing browser security policies. WWW 2010: 941-950
2000 – 2009
- 2009
[c4]Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter:
The Multi-Principal OS Construction of the Gazelle Web Browser. USENIX Security Symposium 2009: 417-432- 2008
[c3]Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou:
Designing and Implementing Malicious Hardware. LEET 2008
[c2]Chris Grier, Shuo Tang, Samuel T. King:
Secure Web Browsing with the OP Web Browser. IEEE Symposium on Security and Privacy 2008: 402-416- 2006
[j1]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version). Simulation 82(1): 43-59 (2006)- 2005
[c1]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises. PADS 2005: 119-128
Coauthor Index
last updated on 2018-06-28 14:08 CEST by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint



Google
Google Scholar
MS Academic
CiteSeerX
CORE
Semantic Scholar