1

An Extensive Study of Residential Proxies in China

We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for which little is studied in previous works.Our study is made possible through a semantic-based classifier to automatically capture RESIP services. In …

Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam

In this research project, up-to-date SMS spam campaigns are harvested by means of a continous and intelligent pipeline. An extensive measurement is also conducted with insightful security observations distilled.

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks

detect and understand how mobile devices are recruited to serve as web proxies

Understanding iOS-based Crowdturfing Through Hidden UI Analysis

Detect and measure hidden crowdturfing UIs in IOS apps.

Resident Evil: Understanding Residential IP Proxy as a Dark Service

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?

Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

3rd-party skills on voice assistant platforms incur new seurity threats to users.

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs

Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations

Understanding and detecting manipulation of search engine autocomplete.

An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance

A comprehensive measurement of IFTTT, an IoT workflow platform, to reveal its network and security implications.

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment

Understand and mitigate synchronized token lifting and spending in mobile payment.