1

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs

Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs

Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations

Understanding and detecting manipulation of search engine autocomplete.

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations

Understanding and detecting manipulation of search engine autocomplete.

An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance

A comprehensive measurement of IFTTT, an IoT workflow platform, to reveal its network and security implications.

An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance

A comprehensive measurement of IFTTT, an IoT workflow platform, to reveal its network and security implications.

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment

Understand and mitigate synchronized token lifting and spending in mobile payment.

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment

Understand and mitigate synchronized token lifting and spending in mobile payment.

Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service pr ovider networks

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?

Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service pr ovider networks

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?