We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for which little is studied in previous works.Our study is made possible through a semantic-based classifier to automatically capture RESIP services. In …
In this research project, up-to-date SMS spam campaigns are harvested by means of a continous and intelligent pipeline. An extensive measurement is also conducted with insightful security observations distilled.
detect and understand how mobile devices are recruited to serve as web proxies
detect and understand how mobile devices are recruited to serve as web proxies
How can millions of residential IPs serve as traffic exits in commercial web proxy networks?
How can millions of residential IPs serve as traffic exits in commercial web proxy networks?
Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …
Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …
Understanding and detecting manipulation of search engine autocomplete.
Understanding and detecting manipulation of search engine autocomplete.