Follow
Christian Kreibich
Christian Kreibich
An engineer at Corelight
Verified email at icir.org - Homepage
Title
Cited by
Cited by
Year
Honeycomb: creating intrusion detection signatures using honeypots
C Kreibich, J Crowcroft
ACM SIGCOMM computer communication review 34 (1), 51-56, 2004
11882004
Network Intrusion Detection: Evasion, Traffic Normalization, and {End-to-End} Protocol Semantics
M Handley, V Paxson, C Kreibich
10th USENIX Security Symposium (USENIX Security 01), 2001
7042001
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5942008
Netalyzr: Illuminating the edge network
C Kreibich, N Weaver, B Nechaev, V Paxson
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010
4692010
Measuring {Pay-per-Install}: The commoditization of malware distribution
J Caballero, C Grier, C Kreibich, V Paxson
20th USENIX Security Symposium (USENIX Security 11), 2011
4102011
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3742011
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
J Caballero, P Poosankam, C Kreibich, D Song
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3652009
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE symposium on security and privacy, 65-79, 2012
3202012
Unexpected means of protocol inference
J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 313-326, 2006
3162006
Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem
A Razaghpanah, R Nithyanand, N Vallina-Rodriguez, S Sundaresan, ...
The 25th annual network and distributed system security symposium (NDSS 2018), 2018
3072018
On the Potential of Proactive Domain Blacklisting.
M Felegyhazi, C Kreibich, V Paxson
LEET 10, 6-6, 2010
2542010
{PharmaLeaks}: Understanding the Business of Online Pharmaceutical Affiliate Programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
21st USENIX Security Symposium (USENIX Security 12), 1-16, 2012
1792012
Recent Advances in Intrusion Detection
JHA SOMESH, R SOMMER, C KREIBICH
vol 6307, 15, 2010
1752010
Architecture of a network monitor
A Moore, J Hall, C Kreibich, E Harris, I Pratt
Passive & Active Measurement Workshop 2003, 2003
1732003
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
1672011
Spamcraft: An Inside Look At Spam Campaign Orchestration.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET, 2009
1372009
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
1292010
Understanding the domain registration behavior of spammers
S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ...
Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013
1262013
On the spam campaign trail.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET 8 (2008), 1-9, 2008
1212008
Haystack: In situ mobile traffic analysis in user space
A Razaghpanah, N Vallina-Rodriguez, S Sundaresan, C Kreibich, P Gill, ...
arXiv preprint arXiv:1510.01419, 1-13, 2015
1112015
The system can't perform the operation now. Try again later.
Articles 1–20