Kirill Levchenko
Kirill Levchenko
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
ACM Internet Measurement Conference, 127-140, 2013
12072013
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
ACM Conference on Computer and Communications Security, 3-14, 2008
5532008
Click Trajectories: End-to-End Analysis of the Spam Value Chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
IEEE Symposium on Security and Privacy, 431-446, 2011
3332011
An Analysis of Underground Forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
ACM Internet Measurement Conference, 71-80, 2011
3182011
Unexpected Means of Protocol Inference
J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker
ACM Internet Measurement Conference, 313-326, 2006
2802006
Re: CAPTCHAs – Understanding CAPTCHA-Solving Services in an Economic Context
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
USENIX Security Symposium, 2010
2652010
Manufacturing Compromise: The Emergence of Exploit-as-a-Service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
ACM Conference on Computer and Communications Security, 821-832, 2012
2612012
California Fault Lines: Understanding the Causes and Impact of Network Failures
D Turner, K Levchenko, AC Snoeren, S Savage
ACM SIGCOMM, 315-326, 2010
1982010
Show Me the Money: Characterizing Spam-advertised Revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
USENIX Security Symposium, 2011
1552011
Pharmaleaks: Understanding the Business of Online Pharmaceutical Affiliate Programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
USENIX Security Symposium, 2012
1532012
Spamcraft: An Inside Look At Spam Campaign Orchestration
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
USENIX LEET Workshop, 2009
1252009
On the Spam Campaign Trail
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
USENIX LEET Workshop, 2008
1242008
Botnet Judo: Fighting Spam with Itself
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
Network & Distributed System Security Symposium, 2010
1212010
Dirty jobs: The role of freelance labor in web service abuse
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 20th USENIX conference on Security, 14-14, 2011
1192011
Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator
RR Kompella, K Levchenko, AC Snoeren, G Varghese
ACM SIGCOMM Computer Communication Review 39 (4), 255-266, 2009
1072009
Tracking Ransomware End-to-End
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
IEEE Symposium on Security and Privacy, 618-631, 2018
1052018
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
C Kanich, K Levchenko, B Enright, GM Voelker, S Savage
LEET 8, 1-9, 2008
982008
Compressing network graphs
AC Gilbert, K Levchenko
Proceedings of the LinkKDD workshop at the 10th ACM Conference on KDD 124, 2004
952004
Botcoin: Monetizing Stolen Cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS, 2014
942014
Characterizing large-scale click fraud in zeroaccess
P Pearce, V Dave, C Grier, K Levchenko, S Guha, D McCoy, V Paxson, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
732014
The system can't perform the operation now. Try again later.
Articles 1–20