Web Security

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks

detect and understand how mobile devices are recruited to serve as web proxies

Resident Evil: Understanding Residential IP Proxy as a Dark Service

How can millions of residential IPs serve as traffic exits in commercial web proxy networks?

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs

Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations

Understanding and detecting manipulation of search engine autocomplete.