default search action
Chris Grier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c26]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167 - [c25]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - 2014
- [c24]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c23]Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy:
Dialing Back Abuse on Phone Verified Accounts. CCS 2014: 465-476 - [c22]Kurt Thomas, Frank Li, Chris Grier, Vern Paxson:
Consequences of Connectivity: Characterizing Account Hijacking on Twitter. CCS 2014: 489-500 - [c21]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - [c20]Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson:
Hulk: Eliciting Malicious Behavior in Browser Extensions. USENIX Security Symposium 2014: 641-654 - 2013
- [c19]Shuang Hao, Matthew Thomas, Vern Paxson, Nick Feamster, Christian Kreibich, Chris Grier, Scott Hollenbeck:
Understanding the domain registration behavior of spammers. Internet Measurement Conference 2013: 63-76 - [c18]Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. USENIX Security Symposium 2013: 195-210 - 2012
- [c17]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c16]Kurt Thomas, Chris Grier, Vern Paxson:
Adapting Social Spam Infrastructure for Political Censorship. LEET 2012 - [c15]Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen:
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. IEEE Symposium on Security and Privacy 2012: 65-79 - 2011
- [j3]Chris Grier, Shuo Tang, Samuel T. King:
Designing and Implementing the OP and OP2 Web Browsers. ACM Trans. Web 5(2): 11:1-11:35 (2011) - [c14]Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson:
What's Clicking What? Techniques and Innovations of Today's Clickbots. DIMVA 2011: 164-183 - [c13]Kurt Thomas, Chris Grier, Dawn Song, Vern Paxson:
Suspended accounts in retrospect: an analysis of twitter spam. Internet Measurement Conference 2011: 243-258 - [c12]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c11]Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song:
Design and Evaluation of a Real-Time URL Spam Filtering Service. IEEE Symposium on Security and Privacy 2011: 447-462 - [c10]Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson:
Measuring Pay-per-Install: The Commoditization of Malware Distribution. USENIX Security Symposium 2011 - [c9]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - 2010
- [c8]Chris Grier, Kurt Thomas, Vern Paxson, Chao Michael Zhang:
@spam: the underground on 140 characters or less. CCS 2010: 27-37 - [c7]Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song:
Insights from the Inside: A View of Botnet Management from Infiltration. LEET 2010 - [c6]Kurt Thomas, Chris Grier, David M. Nicol:
unFriendly: Multi-party Privacy Risks in Social Networks. Privacy Enhancing Technologies 2010: 236-252 - [c5]Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King:
Alhambra: a system for creating, enforcing, and testing browser security policies. WWW 2010: 941-950
2000 – 2009
- 2009
- [b1]Chris Grier:
Designing, Implementing, and Evaluating Secure Web Browsers. University of Illinois Urbana-Champaign, USA, 2009 - [c4]Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter:
The Multi-Principal OS Construction of the Gazelle Web Browser. USENIX Security Symposium 2009: 417-432 - 2008
- [j2]Chris Grier, Shuo Tang, Samuel T. King:
Building a More Secure Web Browser. login Usenix Mag. 33(4) (2008) - [c3]Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou:
Designing and Implementing Malicious Hardware. LEET 2008 - [c2]Chris Grier, Shuo Tang, Samuel T. King:
Secure Web Browsing with the OP Web Browser. SP 2008: 402-416 - 2006
- [j1]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version). Simul. 82(1): 43-59 (2006) - 2005
- [c1]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises. PADS 2005: 119-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint