BITS Publications

2015

[MerrifieldEtal15]
Timothy Merrifield, Joseph Devietti, and Jakob Eriksson. High-performance determinism with total store order consistency. In Proceedings of the Tenth European Conference on Computer Systems, pages 31:1--31:13. ACM, 2015.
[MusaEtal15]
A. Musa, J. Biagioni, and J. Eriksson. Trading off accuracy, timeliness, and uplink usage in online gps tracking. Mobile Computing, IEEE Transactions on, PP(99):1--1, 2015.
[KhanKanich15]
Mohammad Taha Khan and Chris Kanich. High fidelity, high risk, high reward: Using high-fidelity networking data in ethically sound research. In Proceedings of the ACM SIGCOMM Workshop on Ethics in Networked Systems, aug 2015.
[SnyderKanich15]
Peter Snyder and Chris Kanich. No please, after you: Detecting fraud in affiliate marketing networks. In Workshop on the Economics of Information Security, jun 2015.
[KhanEtal15]
Mohammad Taha Khan, Xiang Huo, Zhou Li, and Chris Kanich. Every second counts: Quantifying the negative externalities of cybercrime via typosquatting. In Proceedings of the 36th IEEE Symposium on Security and Privacy, may 2015.
[ClarkEtal15]
Jason W. Clark, Peter Snyder, Damon McCoy, and Chris Kanich. I saw images i didn't even know i had: Understanding user perceptions of cloud storage privacy. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, apr 2015.
[SnyderKanich15a]
Peter Snyder and Chris Kanich. One thing leads to another: Credential based privilege escalation. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (Poster Session), mar 2015.

2014

[SnyderKanich14]
Peter Snyder and Chris Kanich. Cloudsweeper and data-centric security. ACM SIGCAS Computers and Society, 44(2):8--10, jul 2014.
[BhagavatulaEtal14]
Sruti Bhagavatula, Christopher Dunn, Chris Kanich, Minaxi Gupta, and Brian Ziebart. Leveraging machine learning to improve unwanted resource filtering. In Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, oct 2014.
[SzurdiEtal14]
Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and Chris Kanich. The long “taile” of typosquatting domain names. In Proceedings of the USENIX Security Symposium, aug 2014.

2013

[BiagioniEtal13]
James Biagioni, ABM Musa, and Jakob Eriksson. Thrifty tracking: Online gps tracking with low data uplink usage. In GIS. ACM, November 2013. 4 pages. [ .pdf ]
[MerrifieldEriksson13a]
Timothy Merrifield and Jakob Eriksson. Conversion: Multi-version concurrency control for main memory segments. In EuroSys, pages 127--139, April 2013. [ .pdf ]
[MerrifieldEriksson13]
Timothy Merrifield and Jakob Eriksson. Increasing concurrency in deterministic runtimes with conversion. In 4th Workshop on Determinism and Correctness in Parallel Programming, March 2013. 5 pages. [ .pdf ]
[BiagioniKrumm13]
James Biagioni and John Krumm. Days of Our Lives: Assessing Day Similarity from Location Traces. In User Modeling, Adaptation, and Personalization, volume 7899 of Lecture Notes in Computer Science, pages 89--101. Springer Berlin Heidelberg, 2013. [ .pdf ]
[SnyderKanich13]
Peter Snyder and Chris Kanich. Cloudsweeper: Enabling data-centric document management for secure cloud archives. In Proceedings of the ACM Cloud Computing Security Workshop, 2013.

2012

[MusaEriksson12]
A.B.M. Musa and Jakob Eriksson. Tracking Unmodified Smartphones Using Wi-Fi Monitors. In SenSys, pages 281--294. ACM, November 2012. [ .pdf ]
[BiagioniEriksson12]
James Biagioni and Jakob Eriksson. Map Inference in the Face of Noise and Disparity. In GIS, pages 79--88. ACM SIGSPATIAL, November 2012. [ .pdf ]
[LiuEtal12]
Xuemei Liu, James Biagioni, Jakob Eriksson, Yin Wang, George Forman, and Yanmin Zhu. Mining Large-Scale, Sparse GPS Traces for Map Inference: Comparison of Approaches. In KDD, pages 669--677. ACM, August 2012. [ .pdf ]
[BiagioniEriksson12a]
James Biagioni and Jakob Eriksson. Inferring Road Maps from GPS Traces: Survey and Comparative Evaluation. In 91st Annual Meeting of the Transportation Research Board, January 2012. 21 pages. [ .pdf ]
[BiagioniEriksson12b]
James Biagioni and Jakob Eriksson. Inferring Road Maps from Global Positioning System Traces: Survey and Comparative Evaluation. Transportation Research Record (TRR), Journal of the Transportation Research Board, (2291):61--71, 2012. [ .pdf ]
[PitsillidisEtal12]
Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, and Stefan Savage. Taster's choice: A comparative analysis of spam feeds. In Proceedings of the ACM Internet Measurement Conference (IMC), 2012.
[Kanich12]
Chris Kanich. Characterizing Internet Scams through Underground Infrastructure Infiltration. PhD thesis, University of California, San Diego, 2012.
[GargEtal12]
Vaibhav Garg, Chris Kanich, and L. Jean Camp. Analysis of e-crime in crowd-sourced labor markets: Mechanical turk vs. freelancer. In Proceedings of the 11th Workshop on the Economics of Information Security (WEIS), 2012.

2011

[BiagioniEtal11]
James Biagioni, Tomas Gerlich, Timothy Merrifield, and Jakob Eriksson. EasyTracker: Automatic Transit Tracking, Mapping, and Arrival Time Prediction Using Smartphones. In SenSys, pages 68--81. ACM, 2011. Best presentation award. [ .pdf ]
[GerlichEtal11]
Tomas Gerlich, James Biagioni, Timothy Merrifield, and Jakob Eriksson. Demo: Tracking Transit with EasyTracker. In SenSys, pages 401--402. ACM, 2011. [ .pdf ]
[MusaEriksson11]
A.B.M. Musa and Jakob Eriksson. Demo: WiFlow - Real Time Travel Time Estimation Using Wi-Fi Monitors. In SenSys, pages 429--430. ACM, 2011. [ .pdf ]
[KreibichEtal11]
Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, and Vern Paxson. GQ: Practical containment for measuring modern malware systems. In Proceedings of the ACM Internet Measurement Conference (IMC), 2011.
[LevchenkoEtal11]
Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage. Click trajectories: End-to-end analysis of the spam value chain. In Proceedings of the IEEE Symposium on Security and Privacy, 2011. featured.
[KanichEtal11]
Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage. Show me the money: Characterizing spam-advertised revenue. In Proceedings of the 20th USENIX Security Symposium, 2011.
[KanichEtal11a]
Chris Kanich, Stephen Checkoway, and Keaton Mowery. Putting out a hit: Crowdsourcing malware installs. In Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011.
[KanichEtal11b]
Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. No plan survives contact: Experience with cybercrime measurement. In Proceedings of the 4th USENIX Workshop on Cyber Security Experimentation and Test, 2011.

2010

[ThiagarajanEtal10]
Arvind Thiagarajan, James Biagioni, Tomas Gerlich, and Jakob Eriksson. Cooperative Transit Tracking using GPS-enabled Smartphones. In SenSys, pages 85--98. ACM, 2010. [ .pdf ]
[MotoyamaEtal10]
Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. Re: Captchas -- understanding captcha solving from an economic context. In Proceedings of the 19th USENIX Security Symposium, 2010. featured.
[PitsillidisEtal10]
Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, and Stefan Savage. Botnet judo: Fighting spam with itself. In Proceedings of NDSS '10, 2010.

2009

[BiagioniEtal09]
James Biagioni, Adrian Agresta, Tomas Gerlich, and Jakob Eriksson. TransitGenie: A real-time, context-aware transit navigator (demo abstract). In SenSys, pages 329--330. ACM, 2009. [ .pdf ]
[ThiagarajanEtal09]
Arvind Thiagarajan, Lenin Sivalingam, Katrina LaCurts, Sivan Toledo, Jakob Eriksson, Samuel Madden, and Hari Balakrishnan. VTrack: Accurate, Energy-Aware Traffic Delay Estimation Using Mobile Phones. In SenSys, pages 85--98. ACM, 2009. Best paper award. [ .pdf ]
[BiagioniEtal09a]
James Biagioni, Piotr Szczurek, Peter Nelson, and Abolfazl Mohammadian. Tour-Based Mode Choice Modeling: Using an Ensemble of Conditional and Unconditional Data Mining Classifiers. In 88th Annual Meeting of the Transportation Research Board, 2009. 16 pages. [ .pdf ]
[KreibichEtal09]
Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage. Spamcraft: An inside look at spam campaign orchestration. In Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009.
[KanichEtal09]
Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage. Spamalytics: An empirical analysis of spam marketing conversion. In ACM Communications of the Association for Computing Machinery, 2009.

Topic attachments
I Attachment Action Size Date Who Comment
Unknown file formatbib james.bib manage 1.2 K 2013-07-13 - 05:33 UnknownUser  
Unknown file formatbib kanich_pubs.bib manage 8.1 K 2016-03-16 - 00:58 UnknownUser  
Unknown file formatbib papers.bib manage 16.4 K 2016-03-16 - 01:02 UnknownUser  
 
Copyright 2016 The Board of Trustees
of the University of Illinois.webmaster@cs.uic.edu
WISEST
Helping Women Faculty Advance
Funded by NSF