Æȷοì
Chris Grier
Chris Grier
University of California, Berkeley
imchris.orgÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
@ spam: the underground on 140 characters or less
C Grier, K Thomas, V Paxson, M Zhang
Proceedings of the 17th ACM conference on Computer and communications ¡¦, 2010
8142010
Design and evaluation of a real-time url spam filtering service
K Thomas, C Grier, J Ma, V Paxson, D Song
2011 IEEE symposium on security and privacy, 447-462, 2011
6642011
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013
617*2013
Suspended accounts in retrospect: an analysis of twitter spam
K Thomas, C Grier, D Song, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement ¡¦, 2011
6172011
Designing and Implementing Malicious Hardware.
ST King, J Tucek, A Cozzie, C Grier, W Jiang, Y Zhou
Leet 8, 1-8, 2008
4492008
Measuring {Pay-per-Install}: The commoditization of malware distribution
J Caballero, C Grier, C Kreibich, V Paxson
20th USENIX Security Symposium (USENIX Security 11), 2011
4062011
Revolver: An automated approach to the detection of evasive web-based malware
A Kapravelos, Y Shoshitaishvili, M Cova, C Kruegel, G Vigna
22nd USENIX Security Symposium (USENIX Security 13), 637-652, 2013
405*2013
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3692011
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications ¡¦, 2012
3042012
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE symposium on security and privacy, 65-79, 2012
2972012
SCADA cyber security testbed development
CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol
2006 38th North American Power Symposium, 483-488, 2006
2682006
Secure web browsing with the OP web browser
C Grier, S Tang, ST King
2008 IEEE Symposium on Security and Privacy (sp 2008), 402-416, 2008
2612008
The Multi-Principal OS Construction of the Gazelle Web Browser.
HJ Wang, C Grier, A Moshchuk, ST King, P Choudhury, H Venter
USENIX security symposium 28, 2009
2572009
unfriendly: Multi-party privacy risks in social networks
K Thomas, C Grier, DM Nicol
Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 ¡¦, 2010
1792010
Rinse: The real-time immersive network simulation environment for network security exercises (extended version)
M Liljenstam, J Liu, DM Nicol, Y Yuan, G Yan, C Grier
Simulation 82 (1), 43-59, 2006
1532006
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1522015
Framing dependencies introduced by underground commoditization
K Huang, DWEBC GrierD, TJ Holt, C Kruegel, D McCoy, S Savage, ...
Workshop on the Economics of Information Security, 2015
1472015
Botcoin: Monetizing stolen cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS 2014, 1-16, 2014
1282014
Adapting social spam infrastructure for political censorship
K Thomas, C Grier, V Paxson
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012
1272012
Insights from the Inside: A View of Botnet Management from Infiltration.
CY Cho, J Caballero, C Grier, V Paxson, D Song
LEET 10, 1-1, 2010
1262010
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20