default search action
Christian Kreibich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c40]Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, Phillipa Gill:
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem. NDSS 2018 - 2017
- [c39]Patricia Callejo, Conor Kelton, Narseo Vallina-Rodriguez, Rubén Cuevas, Oliver Gasser, Christian Kreibich, Florian Wohlfart, Ángel Cuevas:
Opportunities and Challenges of Ad-based Measurements from the Edge of the Network. HotNets 2017: 87-93 - 2016
- [c38]Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero:
RevProbe: detecting silent reverse proxies in malicious server infrastructures. ACSAC 2016: 101-112 - [c37]Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Internet Measurement Conference 2016: 215-229 - [i3]Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Multi-perspective Analysis of Carrier-Grade NAT Deployment. CoRR abs/1605.05606 (2016) - [i2]Narseo Vallina-Rodriguez, Srikanth Sundaresan, Abbas Razaghpanah, Rishab Nithyanand, Mark Allman, Christian Kreibich, Phillipa Gill:
Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. CoRR abs/1609.07190 (2016) - 2015
- [c36]Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Nicholas Weaver, Vern Paxson:
Beyond the Radio: Illuminating the Higher Layers of Mobile Networks. MobiSys 2015: 375-387 - [c35]Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Vern Paxson:
Header Enrichment or ISP Enrichment?: Emerging Privacy Threats in Mobile Networks. HotMiddlebox@SIGCOMM 2015: 25-30 - [i1]Abbas Razaghpanah, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Phillipa Gill, Mark Allman, Vern Paxson:
Haystack: In Situ Mobile Traffic Analysis in User Space. CoRR abs/1510.01419 (2015) - 2014
- [c34]Narseo Vallina-Rodriguez, Johanna Amann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Tangled Mass: The Android Root Certificate Stores. CoNEXT 2014: 141-148 - [c33]Nicholas Weaver, Christian Kreibich, Martin Dam, Vern Paxson:
Here Be Web Proxies. PAM 2014: 183-192 - 2013
- [c32]Shuang Hao, Matthew Thomas, Vern Paxson, Nick Feamster, Christian Kreibich, Chris Grier, Scott Hollenbeck:
Understanding the domain registration behavior of spammers. Internet Measurement Conference 2013: 63-76 - 2012
- [c31]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c30]Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, Vern Paxson:
Fathom: a browser-based network measurement platform. Internet Measurement Conference 2012: 73-86 - [c29]Lucas DiCioccio, Renata Teixeira, Martin May, Christian Kreibich:
Probe and Pray: Using UPnP for Home Network Measurements. PAM 2012: 96-105 - [c28]Tristan Halvorson, Janos Szurdi, Gregor Maier, Márk Félegyházi, Christian Kreibich, Nicholas Weaver, Kirill Levchenko, Vern Paxson:
The BIZ Top-Level Domain: Ten Years Later. PAM 2012: 221-230 - [c27]Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen:
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. IEEE Symposium on Security and Privacy 2012: 65-79 - [c26]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - 2011
- [c25]Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson:
What's Clicking What? Techniques and Innovations of Today's Clickbots. DIMVA 2011: 164-183 - [c24]Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, Vern Paxson:
GQ: practical containment for measuring modern malware systems. Internet Measurement Conference 2011: 397-412 - [c23]He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker:
On the Effects of Registrar-level Intervention. LEET 2011 - [c22]Christian Kreibich, Nicholas Weaver, Gregor Maier, Boris Nechaev, Vern Paxson:
Experiences from Netalyzr with engaging users in end-system measurement. W-MUST@SIGCOMM 2011: 25-30 - [c21]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c20]Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson:
Measuring Pay-per-Install: The Commoditization of Malware Distribution. USENIX Security Symposium 2011 - [c19]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c18]Nicholas Weaver, Christian Kreibich, Vern Paxson:
Redirecting DNS for Ads and Profit. FOCI 2011 - 2010
- [c17]Christian Kreibich, Nicholas Weaver, Boris Nechaev, Vern Paxson:
Netalyzr: illuminating the edge network. Internet Measurement Conference 2010: 246-259 - [c16]Márk Félegyházi, Christian Kreibich, Vern Paxson:
On the Potential of Proactive Domain Blacklisting. LEET 2010 - [c15]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010 - [e2]Christian Kreibich, Marko Jahnke:
Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings. Lecture Notes in Computer Science 6201, Springer 2010, ISBN 978-3-642-14214-7 [contents] - [e1]Somesh Jha, Robin Sommer, Christian Kreibich:
Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6307, Springer 2010, ISBN 978-3-642-15511-6 [contents]
2000 – 2009
- 2009
- [j3]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009) - [c14]Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song:
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. CCS 2009: 621-634 - [c13]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 - 2008
- [c12]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. CCS 2008: 3-14 - [c11]Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson:
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. DIMVA 2008: 267-278 - [c10]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
On the Spam Campaign Trail. LEET 2008 - [c9]Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver:
Principles for Developing Comprehensive Network Visibility. HotSec 2008 - 2007
- [b1]Christian Peter Kreibich:
Structural traffic analysis for network security monitoring. University of Cambridge, UK, 2007 - [c8]Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver:
The Strengths of Weaker Identities: Opportunistic Personas. HotSec 2007 - 2006
- [j2]Jon Crowcroft, Christian Kreibich:
Only 365 days left until the Sigcomm deadline. Comput. Commun. Rev. 36(5): 57-62 (2006) - [c7]Christian Kreibich, Jon Crowcroft:
Efficient sequence alignment of network traffic. Internet Measurement Conference 2006: 307-312 - [c6]Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker:
Unexpected means of protocol inference. Internet Measurement Conference 2006: 313-326 - 2005
- [c5]Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer:
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. DIMVA 2005: 206-221 - [c4]Christian Kreibich, Robin Sommer:
Policy-Controlled Event Management for Distributed Intrusion Detection. ICDCS Workshops 2005: 385-391 - [c3]Christian Kreibich:
Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. USENIX ATC, FREENIX Track 2005: 109-118 - 2004
- [j1]Christian Kreibich, Jon Crowcroft:
Honeycomb: creating intrusion detection signatures using honeypots. Comput. Commun. Rev. 34(1): 51-56 (2004) - [c2]Christian Kreibich:
Design and Implementation of Netdude, a Framework for Packet Trace Manipulation (Awarded Best Student Paper!). USENIX ATC, FREENIX Track 2004: 63-72 - 2001
- [c1]Mark Handley, Vern Paxson, Christian Kreibich:
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. USENIX Security Symposium 2001
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint