Scott Xianghang Mi
Resident Evil: Understanding Residential IP Proxy as a Dark Service
How can millions of residential IPs serve as traffic exits in commercial web proxy networks?
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs
Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
Understanding and detecting manipulation of search engine autocomplete.