What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kirill Levchenko
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
CAPSID: A Private Session ID System for Small UAVs.
Yueshen Li
Jianli Jin
Kirill Levchenko
2023
journals/popets
Story Beyond the Eye: Glyph Positions Break PDF Text Redaction.
Maxwell Bland
Anushya Iyer
Kirill Levchenko
2021
conf/uss
Jetset: Targeted Firmware Rehosting for Embedded Systems.
Evan Johnson
Maxwell Bland
Yifei Zhu
Joshua Mason
Stephen Checkoway
Stefan Savage
Kirill Levchenko
2019
conf/uss
Triton: A Software-Reconfigurable Federated Avionics Testbed.
Sam Crow
Brown Farinholt
Brian Johannesmeyer
Karl Koscher
Stephen Checkoway
Stefan Savage
Aaron Schulman
Alex C. Snoeren
Kirill Levchenko
2019
conf/uss
Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers.
Nishant Bhaskar
Maxwell Bland
Kirill Levchenko
Aaron Schulman
2018
conf/uss
Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem.
Mohammad Rezaeirad
Brown Farinholt
Hitesh Dharmdasani
Paul Pearce
Kirill Levchenko
Damon McCoy
2018
conf/fc
Estimating Profitability of Alternative Cryptocurrencies (Short Paper).
Danny Yuxing Huang
Kirill Levchenko
Alex C. Snoeren
2018
conf/sp
Tracking Ransomware End-to-end.
Danny Yuxing Huang
Maxwell Matthaios Aliapoulios
Vector Guo Li
Luca Invernizzi
Elie Bursztein
Kylie McRoberts
Jonathan Levin
Kirill Levchenko
Alex C. Snoeren
Damon McCoy
2017
conf/ccs
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research.
Alexander Gamero-Garrido
Stefan Savage
Kirill Levchenko
Alex C. Snoeren
2017
conf/uss
Dead Store Elimination (Still) Considered Harmful.
Zhaomo Yang
Brian Johannesmeyer
Anders Trier Olesen
Sorin Lerner
Kirill Levchenko
2017
conf/sp
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles.
Moritz Contag
Vector Guo Li
Andre Pawlowski
Felix Domke
Kirill Levchenko
Thorsten Holz
Stefan Savage
2017
conf/sp
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.
Brown Farinholt
Mohammad Rezaeirad
Paul Pearce
Hitesh Dharmdasani
Haikuo Yin
Stevens Le Blond
Damon McCoy
Kirill Levchenko
2015
conf/ccs
Security by Any Other Name: On the Effectiveness of Provider Based Email Security.
Ian D. Foster
Jon Larson
Max Masich
Alex C. Snoeren
Stefan Savage
Kirill Levchenko
2014
conf/ccs
Characterizing Large-Scale Click Fraud in ZeroAccess.
Paul Pearce
Vacha Dave
Chris Grier
Kirill Levchenko
Saikat Guha
Damon McCoy
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2014
conf/ccs
On The Security of Mobile Cockpit Information Systems.
Devin Lundberg
Brown Farinholt
Edward Sullivan
Ryan A. Mast
Stephen Checkoway
Stefan Savage
Alex C. Snoeren
Kirill Levchenko
2014
conf/ndss
Botcoin: Monetizing Stolen Cycles.
Danny Yuxing Huang
Hitesh Dharmdasani
Sarah Meiklejohn
Vacha Dave
Chris Grier
Damon McCoy
Stefan Savage
Nicholas Weaver
Alex C. Snoeren
Kirill Levchenko
2012
conf/ccs
Manufacturing compromise: the emergence of exploit-as-a-service.
Chris Grier
Lucas Ballard
Juan Caballero
Neha Chachra
Christian J. Dietrich
Kirill Levchenko
Panayiotis Mavrommatis
Damon McCoy
Antonio Nappa
Andreas Pitsillidis
Niels Provos
M. Zubair Rafique
Moheeb Abu Rajab
Christian Rossow
Kurt Thomas
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2012
conf/uss
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Damon McCoy
Andreas Pitsillidis
Grant Jordan
Nicholas Weaver
Christian Kreibich
Brian Krebs
Geoffrey M. Voelker
Stefan Savage
Kirill Levchenko
2011
conf/uss
Show Me the Money: Characterizing Spam-advertised Revenue.
Chris Kanich
Nicholas Weaver
Damon McCoy
Tristan Halvorson
Christian Kreibich
Kirill Levchenko
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2011
conf/uss
No Plan Survives Contact: Experience with Cybercrime Measurement.
Chris Kanich
Neha Chachra
Damon McCoy
Chris Grier
David Y. Wang
Marti Motoyama
Kirill Levchenko
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.
Marti Motoyama
Damon McCoy
Kirill Levchenko
Stefan Savage
Geoffrey M. Voelker
2011
conf/fc
Proximax: Measurement-Driven Proxy Dissemination (Short Paper).
Damon McCoy
Jose Andre Morales
Kirill Levchenko
2011
conf/sp
Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Kirill Levchenko
Andreas Pitsillidis
Neha Chachra
Brandon Enright
Márk Félegyházi
Chris Grier
Tristan Halvorson
Chris Kanich
Christian Kreibich
He Liu
Damon McCoy
Nicholas Weaver
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2010
conf/uss
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Marti Motoyama
Kirill Levchenko
Chris Kanich
Damon McCoy
Geoffrey M. Voelker
Stefan Savage
2010
conf/ndss
Botnet Judo: Fighting Spam with Itself.
Andreas Pitsillidis
Kirill Levchenko
Christian Kreibich
Chris Kanich
Geoffrey M. Voelker
Vern Paxson
Nicholas Weaver
Stefan Savage
2008
conf/ccs
Spamalytics: an empirical analysis of spam marketing conversion.
Chris Kanich
Christian Kreibich
Kirill Levchenko
Brandon Enright
Geoffrey M. Voelker
Vern Paxson
Stefan Savage
2004
conf/ccs
On the difficulty of scalably detecting network attacks.
Kirill Levchenko
Ramamohan Paturi
George Varghese
Coauthors
Aaron Schulman
(2)
Alex C. Snoeren
(7)
Alexander Gamero-Garrido
(1)
Anders Trier Olesen
(1)
Andre Pawlowski
(1)
Andreas Pitsillidis
(4)
Antonio Nappa
(1)
Anushya Iyer
(1)
Brandon Enright
(2)
Brian Johannesmeyer
(2)
Brian Krebs
(1)
Brown Farinholt
(4)
Chris Grier
(5)
Chris Kanich
(6)
Christian J. Dietrich
(1)
Christian Kreibich
(5)
Christian Rossow
(1)
Damon McCoy
(13)
Danny Yuxing Huang
(3)
David Y. Wang
(1)
Devin Lundberg
(1)
Edward Sullivan
(1)
Elie Bursztein
(1)
Evan Johnson
(1)
Felix Domke
(1)
Geoffrey M. Voelker
(10)
George Varghese
(1)
Grant Jordan
(1)
Haikuo Yin
(1)
He Liu
(1)
Hitesh Dharmdasani
(3)
Ian D. Foster
(1)
Jianli Jin
(1)
Jon Larson
(1)
Jonathan Levin
(1)
Jose Andre Morales
(1)
Joshua Mason
(1)
Juan Caballero
(1)
Karl Koscher
(1)
Kirill Levchenko
(27)
Kurt Thomas
(1)
Kylie McRoberts
(1)
Luca Invernizzi
(1)
Lucas Ballard
(1)
M. Zubair Rafique
(1)
Márk Félegyházi
(1)
Marti Motoyama
(3)
Max Masich
(1)
Maxwell Bland
(3)
Maxwell Matthaios Aliapoulios
(1)
Mohammad Rezaeirad
(2)
Moheeb Abu Rajab
(1)
Moritz Contag
(1)
Neha Chachra
(3)
Nicholas Weaver
(5)
Niels Provos
(1)
Nishant Bhaskar
(1)
Panayiotis Mavrommatis
(1)
Paul Pearce
(3)
Ramamohan Paturi
(1)
Ryan A. Mast
(1)
Saikat Guha
(1)
Sam Crow
(1)
Sarah Meiklejohn
(1)
Sorin Lerner
(1)
Stefan Savage
(17)
Stephen Checkoway
(3)
Stevens Le Blond
(1)
Thorsten Holz
(1)
Tristan Halvorson
(2)
Vacha Dave
(2)
Vector Guo Li
(2)
Vern Paxson
(6)
Yifei Zhu
(1)
Yueshen Li
(1)
Zhaomo Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to