Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks
detect and understand how mobile devices are recruited to serve as web proxies
Resident Evil: Understanding Residential IP Proxy as a Dark Service
How can millions of residential IPs serve as traffic exits in commercial web proxy networks?
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs
Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it …
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
Understanding and detecting manipulation of search engine autocomplete.