Follow
Kurt Thomas
Title
Cited by
Cited by
Year
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017
19522017
@ spam: the underground on 140 characters or less
C Grier, K Thomas, V Paxson, M Zhang
Proceedings of the 17th ACM conference on Computer and communications …, 2010
7982010
Design and Evaluation of a Real-Time URL Spam Filtering Service
K Thomas, C Grier, J Ma, V Paxson, D Song
Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 2011
6432011
Suspended accounts in retrospect: an analysis of twitter spam
K Thomas, C Grier, D Song, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
6022011
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
USENIX Security Symposium, 195-210, 2013
3402013
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2922012
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1882017
unfriendly: Multi-party privacy risks in social networks
K Thomas, C Grier, DM Nicol
Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010
1832010
The Koobface botnet and the rise of social malware
K Thomas, DM Nicol
2010 5th International Conference on Malicious and Unwanted Software, 63-70, 2010
1792010
Neither snow nor rain nor MITM... an empirical analysis of email delivery security
Z Durumeric, D Adrian, A Mirian, J Kasten, E Bursztein, N Lidzborski, ...
Proceedings of the 2015 Internet Measurement Conference, 27-39, 2015
1502015
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1432015
Framing Dependencies Introduced by Underground Commoditization
K Thomas, DY Huang, D Wang, B Elie, C Grier, TJ Holt, C Kruegel, ...
Workshop on the Economics of Information Security, 2015
1372015
Adapting social spam infrastructure for political censorship
K Thomas, C Grier, V Paxson
Proceedings of 5th USENIX conf. on LEET 12, 13, 2012
1202012
" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia
N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ...
proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
1092019
Trends and Lessons from Three Years Fighting Malicious Extensions
N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ...
Usenix Security, 2015
952015
Protecting accounts from credential stuffing with password breach alerting.
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
USENIX Security Symposium, 1556-1571, 2019
902019
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
862020
Cloak of visibility: Detecting when machines browse a different web
L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ...
2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016
862016
Rethinking the detection of child sexual abuse imagery on the internet
E Bursztein, E Clarke, M DeLaune, DM Elifff, N Hsu, L Olson, J Shehan, ...
The world wide web conference, 2601-2607, 2019
832019
Consequences of Connectivity: Characterizing Account Hijacking on Twitter
K Thomas, F Li, C Grier, V Paxson
Proceedings of the 21st Annual Conference on Computer and Communications …, 2014
832014
The system can't perform the operation now. Try again later.
Articles 1–20