1

An Extensive Study of Residential Proxies in China

We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for which little is studied in previous works.Our study is made possible through a semantic-based classifier to automatically capture RESIP services. In …

Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam

In this research project, up-to-date SMS spam campaigns are harvested by means of a continous and intelligent pipeline. An extensive measurement is also conducted with insightful security observations distilled.

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks

detect and understand how mobile devices are recruited to serve as web proxies

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks

detect and understand how mobile devices are recruited to serve as web proxies

Understanding iOS-based Crowdturfing Through Hidden UI Analysis

Detect and measure hidden crowdturfing UIs in IOS apps.

Understanding iOS-based Crowdturfing Through Hidden UI Analysis

Detect and measure hidden crowdturfing UIs in IOS apps.

Resident Evil: Understanding Residential IP Proxy as a Dark Service

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?

Resident Evil: Understanding Residential IP Proxy as a Dark Service

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?

Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

3rd-party skills on voice assistant platforms incur new seurity threats to users.

Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems

3rd-party skills on voice assistant platforms incur new seurity threats to users.