default search action
Chris Kanich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Mir Masood Ali, David G. Balash, Monica Kodwani, Chris Kanich, Adam J. Aviv:
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies. Proc. Priv. Enhancing Technol. 2024(4): 142-166 (2024) - [c48]Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi:
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles. CCS 2024: 2192-2206 - [c47]David G. Balash, Mir Masood Ali, Chris Kanich, Adam J. Aviv:
"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps. SOUPS @ USENIX Security Symposium 2024: 413-432 - [c46]Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis:
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps. USENIX Security Symposium 2024 - [i11]John Kristoff, Moritz Müller, Arturo Filastò, Max Resing, Chris Kanich, Niels ten Oever:
Internet Sanctions on Russian Media: Actions and Effects. CoRR abs/2403.05638 (2024) - [i10]Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi:
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles. CoRR abs/2405.00596 (2024) - [i9]Joel Miller, Rishi Advani, Ian A. Kash, Chris Kanich, Lenore D. Zuck:
Decentralized Fair Division. CoRR abs/2408.07821 (2024) - 2023
- [c45]David G. Balash, Mir Masood Ali, Monica Kodwani, Xiaoyuan Wu, Chris Kanich, Adam J. Aviv:
Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem. CCS 2023: 3600-3602 - [c44]Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch:
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. EuroS&P 2023: 576-591 - [c43]Mir Masood Ali, Binoy Chitale, Mohammad Ghasemisharif, Chris Kanich, Nick Nikiforakis, Jason Polakis:
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors. NDSS 2023 - [i8]Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch:
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. CoRR abs/2302.04614 (2023) - [i7]Mir Masood Ali, David G. Balash, Chris Kanich, Adam J. Aviv:
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies. CoRR abs/2306.17063 (2023) - 2022
- [c42]ChangSeok Oh, Chris Kanich, Damon McCoy, Paul Pearce:
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. CCS 2022: 2401-2414 - [c41]Shubham Singh, Bhuvni Shah, Chris Kanich, Ian A. Kash:
Fair Decision-Making for Food Inspections. EAAMO 2022: 5:1-5:11 - [c40]Mohammad Ghasemisharif, Chris Kanich, Jason Polakis:
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments. SP 2022: 1774-1790 - [i6]David G. Balash, Mir Masood Ali, Xiaoyuan Wu, Chris Kanich, Adam J. Aviv:
Longitudinal Analysis of Privacy Labels in the Apple App Store. CoRR abs/2206.02658 (2022) - 2021
- [c39]Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis:
Tales of Favicons and Caches: Persistent Tracking in Modern Browsers. NDSS 2021 - [c38]John Kristoff, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis:
Plight at the End of the Tunnel - Legacy IPv6 Transition Mechanisms in the Wild. PAM 2021: 390-405 - [c37]Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva:
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage. USENIX Security Symposium 2021: 1145-1162 - 2020
- [c36]Huixin Tian, Chris Kanich, Jason Polakis, Sameer Patil:
Tech Pains: Characterizations of Lived Cybersecurity Experiences. EuroS&P Workshops 2020: 250-259 - [c35]John Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C. Schmidt, Matthias Wählisch:
On Measuring RPKI Relying Parties. Internet Measurement Conference 2020: 484-491
2010 – 2019
- 2019
- [c34]Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva:
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media. CCS 2019: 991-1008 - 2018
- [c33]Sara Amini, Vahid Noroozi, Sara Bahaadini, Philip S. Yu, Chris Kanich:
DeepFP: A Deep Learning Framework For User Fingerprinting via Mobile Motion Sensors. IEEE BigData 2018: 84-91 - [c32]Mohammad Taha Khan, Maria Hyun, Chris Kanich, Blase Ur:
Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage. CHI 2018: 543 - [c31]Ameya Hanamsagar, Simon S. Woo, Chris Kanich, Jelena Mirkovic:
Leveraging Semantic Transformation to Investigate Password Habits and Their Causes. CHI 2018: 570 - [c30]Sara Amini, Vahid Noroozi, Amit Pande, Satyajit Gupte, Philip S. Yu, Chris Kanich:
DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps. CIKM 2018: 2027-2035 - [c29]Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Vallina-Rodriguez:
An Empirical Analysis of the Commercial VPN Ecosystem. Internet Measurement Conference 2018: 443-456 - [c28]Rashid Tahir, Ali Raza, Faizan Ahmad, Jehangir Kazi, Fareed Zaffar, Chris Kanich, Matthew Caesar:
It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting. INFOCOM 2018: 2618-2626 - [c27]Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, Jason Polakis:
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web. USENIX Security Symposium 2018: 1475-1492 - 2017
- [j5]Chris Kanich:
The costs and benefits of treating the browser like an operating system: how ad blockers help us better understand how different browser features are used and who they benefit. SIGCAS Comput. Soc. 47(2): 16-18 (2017) - [c26]Peter Snyder, Cynthia Bagier Taylor, Chris Kanich:
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security. CCS 2017: 179-194 - [c25]Sara Amini, Chris Kanich:
Characterizing the impact of malware infections and remediation attempts through support forum analysis. eCrime 2017: 70-78 - [c24]Ivan Brugere, Chris Kanich, Tanya Y. Berger-Wolf:
Network Model Selection for Task-Focused Attributed Network Inference. ICDM Workshops 2017: 118-125 - [c23]Peter Snyder, Periwinkle Doerfler, Chris Kanich, Damon McCoy:
Fifteen minutes of unwanted fame: detecting and characterizing doxing. Internet Measurement Conference 2017: 432-444 - [i5]Ivan Brugere, Chris Kanich, Tanya Y. Berger-Wolf:
A General Framework For Task-Oriented Network Inference. CoRR abs/1705.00645 (2017) - [i4]Ivan Brugere, Chris Kanich, Tanya Y. Berger-Wolf:
Evaluating Social Networks Using Task-Focused Network Inference. CoRR abs/1707.02385 (2017) - [i3]Ivan Brugere, Chris Kanich, Tanya Y. Berger-Wolf:
Network Model Selection for Task-Focused Attributed Network Inference. CoRR abs/1708.06303 (2017) - [i2]Peter Snyder, Cynthia Bagier Taylor, Chris Kanich:
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security. CoRR abs/1708.08510 (2017) - 2016
- [j4]Peter Snyder, Chris Kanich:
Characterizing fraud and its ramifications in affiliate marketing networks. J. Cybersecur. 2(1): 71-81 (2016) - [c22]Peter Snyder, Lara Ansari, Cynthia Bagier Taylor, Chris Kanich:
Browser Feature Usage on the Modern Web. Internet Measurement Conference 2016: 97-110 - [i1]Peter Snyder, Lara Ansari, Cynthia Bagier Taylor, Chris Kanich:
Browser Feature Usage on the Modern Web. CoRR abs/1605.06467 (2016) - 2015
- [c21]Jason W. Clark, Peter Snyder, Damon McCoy, Chris Kanich:
"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy. CHI 2015: 1641-1644 - [c20]Peter Snyder, Chris Kanich:
One Thing Leads to Another: Credential Based Privilege Escalation. CODASPY 2015: 135-137 - [c19]Mohammad Taha Khan, Chris Kanich:
High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research. NS Ethics@SIGCOMM 2015: 23-26 - [c18]Mohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich:
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting. IEEE Symposium on Security and Privacy 2015: 135-150 - [c17]Peter Snyder, Chris Kanich:
No Please, After You: Detecting Fraud in Affiliate Marketing Networks. WEIS 2015 - 2014
- [j3]Peter Snyder, Chris Kanich:
Cloudsweeper and data-centric security. SIGCAS Comput. Soc. 44(2): 8-10 (2014) - [c16]Sruti Bhagavatula, Christopher W. Dunn, Chris Kanich, Minaxi Gupta, Brian D. Ziebart:
Leveraging Machine Learning to Improve Unwanted Resource Filtering. AISec@CCS 2014: 95-102 - [c15]Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan M. Spring, Márk Félegyházi, Chris Kanich:
The Long "Taile" of Typosquatting Domain Names. USENIX Security Symposium 2014: 191-206 - [e2]Chris Kanich, Patrick Lardieri:
7th Workshop on Cyber Security Experimentation and Test, CSET '14, San Diego, CA, USA, August 18, 2014. USENIX Association 2014 [contents] - 2013
- [c14]Peter Snyder, Chris Kanich:
CloudSweeper: enabling data-centric document management for secure cloud archives. CCSW 2013: 47-54 - [p1]Vaibhav Garg, L. Jean Camp, Chris Kanich:
Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer. The Economics of Information Security and Privacy 2013: 301-321 - [e1]Chris Kanich, Micah Sherr:
6th Workshop on Cyber Security Experimentation and Test, CSET '13, Washington, D.C., USA, August 12, 2013. USENIX Association 2013 [contents] - 2012
- [b1]Chris Kanich:
Characterizing internet scams through underground infrastructure infiltration. University of California, San Diego, USA, 2012 - [c13]Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage:
Taster's choice: a comparative analysis of spam feeds. Internet Measurement Conference 2012: 427-440 - [c12]Vaibhav Garg, Chris Kanich, L. Jean Camp:
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. WEIS 2012 - 2011
- [c11]Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, Vern Paxson:
GQ: practical containment for measuring modern malware systems. Internet Measurement Conference 2011: 397-412 - [c10]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c9]Chris Kanich, Stephen Checkoway, Keaton Mowery:
Putting Out a HIT: Crowdsourcing Malware Installs. WOOT 2011: 71-80 - [c8]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - [c7]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - 2010
- [c6]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010 - [c5]Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. USENIX Security Symposium 2010: 435-462
2000 – 2009
- 2009
- [j2]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009) - [c4]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 - 2008
- [j1]Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, Kirill Levchenko:
Storm: When Researchers Collide. login Usenix Mag. 33(4) (2008) - [c3]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. CCS 2008: 3-14 - [c2]Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage:
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. LEET 2008 - [c1]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
On the Spam Campaign Trail. LEET 2008
Coauthor Index
aka: Geoff Voelker
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint