Follow
Christian Kreibich
Christian Kreibich
An engineer at Corelight
Verified email at icir.org - Homepage
Title
Cited by
Cited by
Year
Honeycomb: creating intrusion detection signatures using honeypots
C Kreibich, J Crowcroft
ACM SIGCOMM computer communication review 34 (1), 51-56, 2004
11942004
Network Intrusion Detection: Evasion, Traffic Normalization, and {End-to-End} Protocol Semantics
M Handley, V Paxson, C Kreibich
10th USENIX Security Symposium (USENIX Security 01), 2001
7052001
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5982008
Netalyzr: Illuminating the edge network
C Kreibich, N Weaver, B Nechaev, V Paxson
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010
4722010
Measuring {Pay-per-Install}: The commoditization of malware distribution
J Caballero, C Grier, C Kreibich, V Paxson
20th USENIX Security Symposium (USENIX Security 11), 2011
4152011
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3792011
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
J Caballero, P Poosankam, C Kreibich, D Song
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3682009
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE symposium on security and privacy, 65-79, 2012
3252012
Unexpected means of protocol inference
J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 313-326, 2006
3172006
Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem
A Razaghpanah, R Nithyanand, N Vallina-Rodriguez, S Sundaresan, ...
The 25th annual network and distributed system security symposium (NDSS 2018), 2018
3142018
On the Potential of Proactive Domain Blacklisting.
M Felegyhazi, C Kreibich, V Paxson
LEET 10, 6-6, 2010
2592010
{PharmaLeaks}: Understanding the Business of Online Pharmaceutical Affiliate Programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
21st USENIX Security Symposium (USENIX Security 12), 1-16, 2012
1802012
Recent Advances in Intrusion Detection
JHA SOMESH, R SOMMER, C KREIBICH
vol 6307, 15, 2010
1752010
Architecture of a network monitor
A Moore, J Hall, C Kreibich, E Harris, I Pratt
Passive & Active Measurement Workshop 2003, 2003
1732003
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
1672011
Spamcraft: An Inside Look At Spam Campaign Orchestration.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET, 2009
1382009
Understanding the domain registration behavior of spammers
S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ...
Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013
1312013
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
1292010
On the spam campaign trail.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET 8 (2008), 1-9, 2008
1212008
Here be web proxies
N Weaver, C Kreibich, M Dam, V Paxson
International Conference on Passive and Active Network Measurement, 183-192, 2014
1122014
The system can't perform the operation now. Try again later.
Articles 1–20