Full publication list

2024

  1. John Kristoff, Max Resing, Moritz Mueller, Arturo Filastò, Chris Kanich, and Niels ten Oever, “Internet Sanctions on Russian Media: Implementation and Effects,” in The proceedings of Free and Open Communications on the Internet (FOCI), 2024.
  2. Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, “Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps,” in Proceedings of the USENIX Security Symposium, 2024.

2023

  1. Rayaan Siddiqi, Shubham Singh, Lenore Zuck, and Chris Kanich, “Tracking, But Make It Offline: The Privacy Implications of Scanning QR Codes Found in the World,” in Proceedings of the Workshop on Technology and Consumer Protection, 2023.
  2. Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C Schmidt, and Matthias Wählisch, “SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots,” in Proceedings of Euro S&P, 2023. PDF
  3. Mir Masood Ali, Binoy Chitale, Mohammad Ghasemisharif, Chris Kanich, Nick Nikiforakis, and Jason Polakis, “Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors,” in Proceedings of NDSS, 2023.

2022

  1. ChangSeok Oh, Chris Kanich, Damon McCoy, and Paul Pearce, “Cart-Ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement,” in Proceedings of ACM CCS, 2022.
  2. Shubham Singh, Bhuvni Shah, Chris Kanich, and Ian A Kash, “Fair decision-making for food inspections,” in Equity and Access in Algorithms, Mechanisms, and Optimization, 2022.
  3. Tanya Berger-Wolf, Allison Howell, Chris Kanich, Ian A Kash, Moniba Keymanesh, Barbara Kowalcyk, Gina Nicholson Kramer, Andrew Perrault, and Shubham Singh, “Open Problems in (Un) fairness of the Retail Food Safety Inspection Process,” in ICML Workshop on Responsible Decision Making in Dynamic Environments, 2022.
  4. Pamela J Gampetro, John P Segvich, Ashley M Hughes, Chris Kanich, Judith M Schlaeger, and Barbara L McFarlin, “Associations between safety outcomes and communication practices among pediatric nurses in the United States,” Journal of Pediatric Nursing, vol. 63, pp. 20–27, 2022.
  5. Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, “Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments,” in 2022 IEEE Symposium on Security and Privacy (SP), 2022.

2021

  1. Anthony E Felder, Betul Bilgin, Joe Hummel, Farzad Mashayek, Renata A Revelo, Vahe Caliskan, Anthony Flowers, Chris Kanich, Susan Lee, Krishna Reddy, and others, “Online Engineering Education in Response to COVID-19: Overview of Challenges in the United States and Proposed Active Learning Strategies,” International Journal of Engineering Education, 2021.
  2. Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, and Elena Zheleva, “Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage,” in Proceedings of the USENIX Security Symposium, 2021.
  3. John Kristoff, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, “Plight at the End of the Tunnel: Legacy IPv6 Transition Mechanisms in the Wild,” in Proceedings of the Passive and Active Measurement Conference, 2021.
  4. Konstantinos Solomos, John Kristoff, Chris Kanich, and Jason Polakis, “Tales of Favicons and Caches: Persistent Tracking in Modern Browsers,” in Proceedings of the Network and Distributed System Security Symposium, 2021.

2020

  1. John Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C Schmidt, and Matthias Wählisch, “On Measuring RPKI Relying Parties,” in Proceedings of the ACM Internet Measurement Conference, 2020, pp. 484–491. PDF
  2. Huixin Tian, Chris Kanich, Jason Polakis, and Sameer Patil, “Tech Pains: Characterizations of Lived Cybersecurity Experiences,” in 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020, pp. 250–259. PDF

2019

  1. Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, and Elena Zheleva, “Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media,” in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 991–1008. PDF

2018

  1. Mohammad Taha Khan, Joe DeBlasio, Chris Kanich, Geoffrey M. Voelker, Alex C. Snoeren, and Narseo Vallina-Rodriguez, “An Empirical Analysis of the Commercial VPN Ecosystem,” in Proceedings of the ACM Internet Measurement Conference, 2018. PDF
  2. Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, and Jason Polakis, “O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web,” in Proceedings of the 27th USENIX Security Symposium, 2018. PDF
  3. Ameya Hanamsagar, Simon Woo, Chris Kanich, and Jelena Mirkovic, “Leveraging Semantic Transformation to Investigate Password Habits and Their Causes,” in Proceedings of the ACM Conference on Human Factors in Computing Systems, 2018. PDF
  4. Mohammad Taha Khan, Maria Hyun, Chris Kanich, and Blase Ur, “Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage,” in Proceedings of the ACM Conference on Human Factors in Computing Systems, 2018. PDF
  5. Rashid Tahir, Ali Raza, Faizan Ahmad, Jehangir Kazi, Fareed Zaffar, Chris Kanich, and Matthew Caesar, “It’s All in the Name: Why Some URLs are More Vulnerable to Typosquatting,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2018. PDF
  6. Sara Amini, Vahid Noroozi, Amit Pande, Satyajit Gupte, Philip S Yu, and Chris Kanich, “DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps,” in Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018, pp. 2027–2035. PDF
  7. Sara Amini, Vahid Noroozi, Sara Bahaadini, S Yu Philip, and Chris Kanich, “DeepFP: A Deep Learning Framework For User Fingerprinting via Mobile Motion Sensors,” in 2018 IEEE International Conference on Big Data (Big Data), 2018, pp. 84–91. PDF

2017

  1. Peter Snyder, Cynthia Taylor, and Chris Kanich, “Most Websites Don’t Need to Vibrate: A Cost–Benefit Approach to Improving Browser Security,” in Proceedings of the 2017 ACM Conference on Computer and Communications Security, 2017. PDF
  2. Peter Snyder, Periwinkle Doerfler, Chris Kanich, and Damon McCoy, “Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing,” in Proceedings of the 2017 Internet Measurement Conference, 2017. PDF
  3. Ivan Brugere, Chris Kanich, and Tanya Berger-Wolf, “Evaluating Social Networks Using Task-Focused Network Inference,” in Proceedings of the 2017 Workshop on Mining and Learning with Graphs, 2017. PDF
  4. Pete Snyder, Laura Waitker, Cynthia Taylor, and Chris Kanich, “CDF: Predictably Secure Web Documents,” in Proceedings of the Workshop on Technology and Consumer Protection, 2017. PDF
  5. Mohammad Taha Khan and Chris Kanich, “Old is Still Gold: A Comparison of Cyber and Traditional Consumer Fraud in The United States,” in Proceedings of the Workshop on Technology and Consumer Protection, 2017. PDF
  6. Sara Amini and Chris Kanich, “Characterizing Malware Infection and Remediation Through Support Forum Analysis,” in Proceedings of the Symposium on Electronic Crime Research (IEEE), 2017. PDF

2016

  1. Peter Snyder, Lara Ansari, Cynthia Taylor, and Chris Kanich, “Browser Feature Usage on the Modern Web,” in Proceedings of the 2016 Internet Measurement Conference, 2016. PDF
  2. Peter Snyder and Chris Kanich, “Characterizing Fraud and Its Ramifications in Affiliate Marketing Networks,” Journal of Cybersecurity, 2016.
  3. Peter Snyder, Michael K. Reiter, and Chris Kanich, “The Effect of Repeated Login Prompts on Phishing Susceptibility,” in Proceedings of the Workshop on Learning from Authoritative Security Experiment Results, 2016. PDF

2015

  1. Mohammad Taha Khan and Chris Kanich, “High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research,” in Proceedings of the ACM SIGCOMM Workshop on Ethics in Networked Systems, 2015. PDF
  2. Peter Snyder and Chris Kanich, “No Please, After You: Detecting Fraud in Affiliate Marketing Networks,” in Workshop on the Economics of Information Security, 2015. PDF
  3. Mohammad Taha Khan, Xiang Huo, Zhou Li, and Chris Kanich, “Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting,” in Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015. PDF
  4. Jason W. Clark, Peter Snyder, Damon McCoy, and Chris Kanich, “I Saw Images I Didn’t Even Know I Had: Understanding User Perceptions of Cloud Storage Privacy,” in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015. PDF
  5. Peter Snyder and Chris Kanich, “One Thing Leads to Another: Credential Based Privilege Escalation,” in Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (Poster Session), 2015. PDF

2014

  1. Sruti Bhagavatula, Christopher Dunn, Chris Kanich, Minaxi Gupta, and Brian Ziebart, “Leveraging Machine Learning to Improve Unwanted Resource Filtering,” in Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, 2014. PDF
  2. Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and Chris Kanich, “The Long ‘Taile’ of Typosquatting Domain Names,” in Proceedings of the USENIX Security Symposium, 2014. PDF
  3. Peter Snyder and Chris Kanich, “Cloudsweeper and Data-Centric Security,” ACM SIGCAS Computers and Society, vol. 44, no. 2, pp. 8–10, Jul. 2014. PDF

2013

  1. Peter Snyder and Chris Kanich, “Cloudsweeper: Enabling Data-Centric Document Management for Secure Cloud Archives,” in Proceedings of the ACM Cloud Computing Security Workshop, 2013. PDF

2012

  1. Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, and Stefan Savage, “Taster’s Choice: A Comparative Analysis of Spam Feeds,” in Proceedings of the ACM Internet Measurement Conference (IMC), 2012. PDF
  2. Chris Kanich, “Characterizing Internet Scams through Underground Infrastructure Infiltration,” PhD thesis, University of California, San Diego, 2012.
  3. Vaibhav Garg, Chris Kanich, and L. Jean Camp, “Analysis of E-Crime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer,” in Proceedings of the 11th Workshop on the Economics of Information Security (WEIS), 2012. PDF

2011

  1. Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, and Vern Paxson, “GQ: Practical Containment for Measuring Modern Malware Systems,” in Proceedings of the ACM Internet Measurement Conference (IMC), 2011. PDF
  2. Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, “Click Trajectories: End-to-End Analysis of the Spam Value Chain,” in Proceedings of the IEEE Symposium on Security and Privacy, 2011. PDF
  3. Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, “Show Me the Money: Characterizing Spam-advertised Revenue,” in Proceedings of the 20th USENIX Security Symposium, 2011. PDF
  4. Chris Kanich, Stephen Checkoway, and Keaton Mowery, “Putting out a HIT: Crowdsourcing Malware Installs,” in Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011. PDF
  5. Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, “No Plan Survives Contact: Experience with Cybercrime Measurement,” in Proceedings of the 4th USENIX Workshop on Cyber Security Experimentation and Test, 2011. PDF

2010

  1. Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, “Re: CAPTCHAs – Understanding CAPTCHA Solving from an Economic Context,” in Proceedings of the 19th USENIX Security Symposium, 2010. PDF
  2. Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, and Stefan Savage, “Botnet Judo: Fighting Spam with Itself,” in Proceedings of NDSS, 2010. PDF

2009

  1. Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, “Spamcraft: An Inside Look At Spam Campaign Orchestration,” in Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009. PDF
  2. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, “Spamalytics: An Empirical Analysis of Spam Marketing Conversion,” in ACM Communications of the Association for Computing Machinery, 2009. PDF

2008

  1. Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, “On the Spam Campaign Trail,” in Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008. PDF
  2. Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, “The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff,” in First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008. PDF
  3. Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, and Kirill Levchenko, “Storm: When Researchers Collide,” in ;login: The USENIX Magazine, 2008. PDF
  4. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, “Spamalytics: An Empirical Analysis of Spam Marketing Conversion,” in Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008. PDF
Home