I am an Associate Professor at the University of Illinois at Chicago in the Department of Computer Science. As of Fall 2022 I also serve as the Director of Undergraduate Studies.

Contact information:

What I look like
Research interests

I conduct data-driven research on the socio-technical aspects of cybersecurity. This research includes characterizing the shifting long-term privacy needs of Internet users, better understanding the extent to which deep learning threatens user security and privacy on the web, as well as the practical impact of security-centric tools like Single Sign-On and VPNs for users and non-users alike.

I am very interested in new collaborations, motivated students, and lively conversation regarding security research - please reach out via email or twitter if you’d like to chat!

Selected media coverage

Dick Simpson, Kathleen Yang-Clayton, and I wrote an op-ed in the Tribune about Chicago’s decennial redistricting.

Our work on Favicon tracking was written up on Ars Technica

I talked to Jacob Goldstein about CAPTCHAs for Planet Money Episode 908: I Am Not A Robot

Our SSO security paper was covered in WIRED Magazine.

Our feature usage paper on The Provocateur Podcast, July 31 2017
Cloudsweeper on Science Friday, July 12 2013
Show Me the Money in The Economist, Oct 15th 2011
Click Trajectories in The New York Times (and the editorial), May 2011
Spamalytics in Wired magazine, March 2011

Students

Ph.D. students:

Ph.D. alums:

Undergrads:

Alums:

Advice for prospective students

Teaching
Professional Activities

I do/have done:

Selected publications
  1. John Kristoff, Max Resing, Moritz Mueller, Arturo Filastò, Chris Kanich, and Niels ten Oever, “Internet Sanctions on Russian Media: Implementation and Effects,” in The proceedings of Free and Open Communications on the Internet (FOCI), 2024.
  2. Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, “Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps,” in Proceedings of the USENIX Security Symposium, 2024.
  3. Rayaan Siddiqi, Shubham Singh, Lenore Zuck, and Chris Kanich, “Tracking, But Make It Offline: The Privacy Implications of Scanning QR Codes Found in the World,” in Proceedings of the Workshop on Technology and Consumer Protection, 2023.
  4. Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C Schmidt, and Matthias Wählisch, “SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots,” in Proceedings of Euro S&P, 2023. PDF
  5. Mir Masood Ali, Binoy Chitale, Mohammad Ghasemisharif, Chris Kanich, Nick Nikiforakis, and Jason Polakis, “Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors,” in Proceedings of NDSS, 2023.
  6. ChangSeok Oh, Chris Kanich, Damon McCoy, and Paul Pearce, “Cart-Ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement,” in Proceedings of ACM CCS, 2022.
  7. Shubham Singh, Bhuvni Shah, Chris Kanich, and Ian A Kash, “Fair decision-making for food inspections,” in Equity and Access in Algorithms, Mechanisms, and Optimization, 2022.
  8. Tanya Berger-Wolf, Allison Howell, Chris Kanich, Ian A Kash, Moniba Keymanesh, Barbara Kowalcyk, Gina Nicholson Kramer, Andrew Perrault, and Shubham Singh, “Open Problems in (Un) fairness of the Retail Food Safety Inspection Process,” in ICML Workshop on Responsible Decision Making in Dynamic Environments, 2022.
  9. Pamela J Gampetro, John P Segvich, Ashley M Hughes, Chris Kanich, Judith M Schlaeger, and Barbara L McFarlin, “Associations between safety outcomes and communication practices among pediatric nurses in the United States,” Journal of Pediatric Nursing, vol. 63, pp. 20–27, 2022.
  10. Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, “Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments,” in 2022 IEEE Symposium on Security and Privacy (SP), 2022.
  11. Anthony E Felder, Betul Bilgin, Joe Hummel, Farzad Mashayek, Renata A Revelo, Vahe Caliskan, Anthony Flowers, Chris Kanich, Susan Lee, Krishna Reddy, and others, “Online Engineering Education in Response to COVID-19: Overview of Challenges in the United States and Proposed Active Learning Strategies,” International Journal of Engineering Education, 2021.
  12. Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, and Elena Zheleva, “Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage,” in Proceedings of the USENIX Security Symposium, 2021.
  13. John Kristoff, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, “Plight at the End of the Tunnel: Legacy IPv6 Transition Mechanisms in the Wild,” in Proceedings of the Passive and Active Measurement Conference, 2021.
  14. Konstantinos Solomos, John Kristoff, Chris Kanich, and Jason Polakis, “Tales of Favicons and Caches: Persistent Tracking in Modern Browsers,” in Proceedings of the Network and Distributed System Security Symposium, 2021.
  15. John Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C Schmidt, and Matthias Wählisch, “On Measuring RPKI Relying Parties,” in Proceedings of the ACM Internet Measurement Conference, 2020, pp. 484–491. PDF
  16. Huixin Tian, Chris Kanich, Jason Polakis, and Sameer Patil, “Tech Pains: Characterizations of Lived Cybersecurity Experiences,” in 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020, pp. 250–259. PDF
  17. Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, and Elena Zheleva, “Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media,” in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 991–1008. PDF
  18. Mohammad Taha Khan, Joe DeBlasio, Chris Kanich, Geoffrey M. Voelker, Alex C. Snoeren, and Narseo Vallina-Rodriguez, “An Empirical Analysis of the Commercial VPN Ecosystem,” in Proceedings of the ACM Internet Measurement Conference, 2018. PDF
  19. Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, and Jason Polakis, “O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web,” in Proceedings of the 27th USENIX Security Symposium, 2018. PDF
  20. Mohammad Taha Khan, Maria Hyun, Chris Kanich, and Blase Ur, “Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage,” in Proceedings of the ACM Conference on Human Factors in Computing Systems, 2018. PDF
  21. Ameya Hanamsagar, Simon Woo, Chris Kanich, and Jelena Mirkovic, “Leveraging Semantic Transformation to Investigate Password Habits and Their Causes,” in Proceedings of the ACM Conference on Human Factors in Computing Systems, 2018. PDF
  22. Rashid Tahir, Ali Raza, Faizan Ahmad, Jehangir Kazi, Fareed Zaffar, Chris Kanich, and Matthew Caesar, “It’s All in the Name: Why Some URLs are More Vulnerable to Typosquatting,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2018. PDF
  23. Sara Amini, Vahid Noroozi, Amit Pande, Satyajit Gupte, Philip S Yu, and Chris Kanich, “DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps,” in Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018, pp. 2027–2035. PDF
  24. Sara Amini, Vahid Noroozi, Sara Bahaadini, S Yu Philip, and Chris Kanich, “DeepFP: A Deep Learning Framework For User Fingerprinting via Mobile Motion Sensors,” in 2018 IEEE International Conference on Big Data (Big Data), 2018, pp. 84–91. PDF
  25. Peter Snyder, Cynthia Taylor, and Chris Kanich, “Most Websites Don’t Need to Vibrate: A Cost–Benefit Approach to Improving Browser Security,” in Proceedings of the 2017 ACM Conference on Computer and Communications Security, 2017. PDF
  26. Peter Snyder, Periwinkle Doerfler, Chris Kanich, and Damon McCoy, “Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing,” in Proceedings of the 2017 Internet Measurement Conference, 2017. PDF
  27. Ivan Brugere, Chris Kanich, and Tanya Berger-Wolf, “Evaluating Social Networks Using Task-Focused Network Inference,” in Proceedings of the 2017 Workshop on Mining and Learning with Graphs, 2017. PDF
  28. Pete Snyder, Laura Waitker, Cynthia Taylor, and Chris Kanich, “CDF: Predictably Secure Web Documents,” in Proceedings of the Workshop on Technology and Consumer Protection, 2017. PDF
  29. Mohammad Taha Khan and Chris Kanich, “Old is Still Gold: A Comparison of Cyber and Traditional Consumer Fraud in The United States,” in Proceedings of the Workshop on Technology and Consumer Protection, 2017. PDF
  30. Sara Amini and Chris Kanich, “Characterizing Malware Infection and Remediation Through Support Forum Analysis,” in Proceedings of the Symposium on Electronic Crime Research (IEEE), 2017. PDF
  31. Peter Snyder, Lara Ansari, Cynthia Taylor, and Chris Kanich, “Browser Feature Usage on the Modern Web,” in Proceedings of the 2016 Internet Measurement Conference, 2016. PDF
  32. Peter Snyder and Chris Kanich, “Characterizing Fraud and Its Ramifications in Affiliate Marketing Networks,” Journal of Cybersecurity, 2016.
  33. Peter Snyder, Michael K. Reiter, and Chris Kanich, “The Effect of Repeated Login Prompts on Phishing Susceptibility,” in Proceedings of the Workshop on Learning from Authoritative Security Experiment Results, 2016. PDF
  34. Mohammad Taha Khan and Chris Kanich, “High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research,” in Proceedings of the ACM SIGCOMM Workshop on Ethics in Networked Systems, 2015. PDF
  35. Peter Snyder and Chris Kanich, “No Please, After You: Detecting Fraud in Affiliate Marketing Networks,” in Workshop on the Economics of Information Security, 2015. PDF
  36. Mohammad Taha Khan, Xiang Huo, Zhou Li, and Chris Kanich, “Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting,” in Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015. PDF
  37. Jason W. Clark, Peter Snyder, Damon McCoy, and Chris Kanich, “I Saw Images I Didn’t Even Know I Had: Understanding User Perceptions of Cloud Storage Privacy,” in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015. PDF
  38. Peter Snyder and Chris Kanich, “One Thing Leads to Another: Credential Based Privilege Escalation,” in Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (Poster Session), 2015. PDF
  39. Sruti Bhagavatula, Christopher Dunn, Chris Kanich, Minaxi Gupta, and Brian Ziebart, “Leveraging Machine Learning to Improve Unwanted Resource Filtering,” in Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, 2014. PDF
  40. Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and Chris Kanich, “The Long ‘Taile’ of Typosquatting Domain Names,” in Proceedings of the USENIX Security Symposium, 2014. PDF
  41. Peter Snyder and Chris Kanich, “Cloudsweeper and Data-Centric Security,” ACM SIGCAS Computers and Society, vol. 44, no. 2, pp. 8–10, Jul. 2014. PDF
  42. Peter Snyder and Chris Kanich, “Cloudsweeper: Enabling Data-Centric Document Management for Secure Cloud Archives,” in Proceedings of the ACM Cloud Computing Security Workshop, 2013. PDF
  43. Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, “Click Trajectories: End-to-End Analysis of the Spam Value Chain,” in Proceedings of the IEEE Symposium on Security and Privacy, 2011. PDF
  44. Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, “Re: CAPTCHAs – Understanding CAPTCHA Solving from an Economic Context,” in Proceedings of the 19th USENIX Security Symposium, 2010. PDF
  45. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, “Spamalytics: An Empirical Analysis of Spam Marketing Conversion,” in Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008. PDF

I maintain a local full publication list and I also try to keep my Google Scholar profile free of false positives and dupes.

view site source