Kirill Levchenko
![]() |
2015
- Security by Any Other Name: On the Effectiveness of Provider Based Email Security- Proceedings of the ACM Conference on Computer and Communications Security, Denver, Colorado, October 2015. ,
- Security by Any Other Name: On the Effectiveness of Provider Based Email Security- Proceedings of the ACM Conference on Computer and Communications Security, Denver, Colorado, October 2015. ,
2014
- On The Security of Mobile Cockpit Information Systems,- Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014. ,
- Botnet Bitcoin Mining.- Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Kirill Levchenko, Alex C. Snoeren, Stefan Savage, Nicholas Weaver, Chris Grier, and Damon McCoy. Proceedings of the Network and Distributed System Security Symposium. San Diego, CA, February 2014.
- XXXtortion? Inferring Registration Intent in the .XXX TLD,- Proceedings of the International World Wide Web Conference (WWW)`, Seoul, Korea, April 2014, pages 901-912. ,
2013
- A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.- Meiklejohn, Pomarole, Jordan, Levchenko, McCoy, Voelker and Savage. IMC 2013. A Variational Approximation for Topic Modeling of Hierarchical Corpora. Kim, Voelker and Saul. ICML 2013.
- A Comparison of Syslog and IS-IS for Monitoring Link State.- Daniel Turner, Kirill Levchenko, Stefan Savage, and Alex C. Snoeren. Proceedings of the ACM/USENIX Internet Measurement Conference. Barcelona, Spain, October 2013.
2012
- Taster's Choice: A Comparative Analysis of Spam Feeds.- Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Boston, MA, November 2012.
- Manufacturing Compromise: The Emergence of Exploit-as-a-Service.- Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012.
- PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.- Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko, Proceedings of the USENIX Security Symposium, Bellevue, WA, August 2012.
- Browser Exploits as a Service: The Monetization of Driveby Downloads.- Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012.
2011
- An Analysis of Underground Forums.- Marti Motoyama, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Berlin, CA, November 2011.
- No Plan Survives Contact: Experience with Cybercrime Measurement.- Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011.
- Show Me the Money: Characterizing Spam-advertised Revenue.- Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
- Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.- Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
- Click Trajectories: End-to-End Analysis of the Spam Value Chain.- Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011.
- On the Effects of Registrar-level Intervention.- He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, March 2011.
2010
- California Fault Lines: Understanding the Causes and Impact of Network Failures.- Daniel Turner, Kirill Levchenko, Alex C. Snoeren, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, New Delhi, India, August 2010.
- Re: CAPTCHAs -- Understanding CAPTCHA-Solving from an Economic Context.- Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Security Symposium, Washington, D.C., August 2010, pages 435-452.
- Measuring Online Service Availability Using Twitter.- Marti Motoyama, Brendan Meeder, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of ACM Workshop on Online Social Networks (WOSN), Boston, MA, June 2010, pages 13:1-13:9.
- Botnet Judo: Fighting Spam with Itself.- Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, and Stefan Savage, Proceedings of the Network and Diestributed System Security Symposium (NDSS), San Diego, CA, February 2010.
2009
- Every Microsecond Counts: Tracking Fine-Grain Latencies with a Lossy Difference Aggregator.- Alvin AuYoung, Amin Vahdat, and Alex C. Snoeren. Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.
- Spamalytics: An Empirical Analysis of Spam Marketing Conversion.- Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Communications of the Association for Computing Machinery 52(9):99-107, September 2009.
- Spamcraft: An Inside Look at Spam Campaign Orchestration.- Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, April 2009.
2008
- Spamalytics: an Empirical Analysis of Spam Marketing Conversion.- Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008.
- XL: An Efficient Network Routing Algorithm.- Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008.
- Storm: When Researchers Collide.- Brandon Enright, Geoff M. Voelker, Stefan Savage, Chris Kanich, and Kirill Levchenko, USENIX ;login: 33(4), August 2008.
- On the Spam Campaign Trail.- Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson and Stefan Savage. Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.
- The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.- Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker and Stefan Savage. Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.
2006
- Automated Protocol Inference: Unexpected Means of Identifying Protocols.- Justin Ma, Kirill Levchenko, Cristian Kriebich, Stefan Savage and Geoffrey M. Voelker. Proceedings of the ACM Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.