Kirill Igorevich Levchenko

If you made any changes in Pure these will be visible here soon.

Research Output

  • 36 Conference contribution
  • 5 Article
  • 3 Conference article
  • 2 Paper
2019

Dynamic property enforcement in programmable data planes

Neves, M., Huffaker, B., Levchenko, K. & Barcellos, M., May 2019, 2019 IFIP Networking Conference, IFIP Networking 2019. Institute of Electrical and Electronics Engineers Inc., 8816830. (2019 IFIP Networking Conference, IFIP Networking 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Please pay inside: Evaluating bluetooth-based detection of gas pump skimmers

Bhaskar, N., Bland, M., Levchenko, K. & Schulman, A., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 373-388 16 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reading the tea leaves: A comparative analysis of threat intelligence

Li, V. G., Dunn, M., Pearce, P., McCoy, D., Voelker, G. M., Savage, S. & Levchenko, K., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 851-867 17 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SparSDR: Sparsity-proportional Backhaul and Compute for SDRs

Khazraee, M., Guddeti, Y., Crow, S., Snoeren, A. C., Levchenko, K., Bharadia, D. & Schulman, A., Jun 12 2019, MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 391-403 13 p. (MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2018

Estimating Profitability of Alternative Cryptocurrencies (Short Paper)

Huang, D. Y., Levchenko, K. & Snoeren, A. C., Jan 1 2018, Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers. Meiklejohn, S. & Sako, K. (eds.). Springer-Verlag, p. 409-419 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10957 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Schrödinger's RAT: Profiling the stakeholders in the remote access Trojan ecosystem

Rezaeirad, M., Farinholt, B., Dharmdasani, H., Pearce, P., Levchenko, K. & McCoy, D., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1043-1060 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tracking Ransomware End-to-end

Huang, D. Y., Aliapoulios, M. M., Li, V. G., Invernizzi, L., Bursztein, E., McRoberts, K., Levin, J., Levchenko, K., Snoeren, A. C. & McCoy, D., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 618-631 14 p. 8418627. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Uncovering bugs in P4 programs with assertion-based verification

Freire, L., Neves, M., Leal, L., Levchenko, K., Schaeffer-Filho, A. & Barcellos, M., Mar 28 2018, Proceedings of the Symposium on SDN Research, SOSR 2018. Association for Computing Machinery, Inc, 3185499. (Proceedings of the Symposium on SDN Research, SOSR 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Dead store elimination (still) considered harmful

Yang, Z., Johannesmeyer, B., Olesen, A. T., Lerner, S. & Levchenko, K., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 1025-1040 16 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles

Contag, M., Li, G., Pawlowski, A., Domke, F., Levchenko, K., Holz, T. & Savage, S., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 231-250 20 p. 7958580. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identifying products in online cybercrime marketplaces: A Dataset for fine-grained domain adaptation

Durrett, G., Kummerfeld, J. K., Berg-Kirkpatrick, T., Portnoff, R. S., Afroz, S., McCoy, D., Levchenko, K. & Paxson, V., 2017, EMNLP 2017 - Conference on Empirical Methods in Natural Language Processing, Proceedings. Association for Computational Linguistics (ACL), p. 2598-2607 10 p. (EMNLP 2017 - Conference on Empirical Methods in Natural Language Processing, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

PacketLab: A universal measurement endpoint interface

Levchenko, K., Dhamdhere, A., Huffaker, B., Claffy, K., Allman, M. & Paxson, V., Nov 1 2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. Association for Computing Machinery, p. 254-260 7 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC; vol. Part F131937).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pinning down abuse on Google maps

Huang, D. Y., Grundman, D., Thomas, K., Kumar, A., Bursztein, E., Levchenko, K. & Snoeren, A. C., Jan 1 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 1471-1479 9 p. 3052590. (26th International World Wide Web Conference, WWW 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantifying the pressure of legal risks on third-party vulnerability research

Gamero-Garrido, A., Savage, S., Levchenko, K. & Snoeren, A. C., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1501-1513 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sandboxing data plane programs for fun and profit

Neves, M., Levchenko, K. & Barcellos, M., Aug 22 2017, SIGCOMM Posters and Demos 2017 - Proceedings of the 2017 SIGCOMM Posters and Demos, Part of SIGCOMM 2017. Association for Computing Machinery, Inc, p. 103-104 2 p. (SIGCOMM Posters and Demos 2017 - Proceedings of the 2017 SIGCOMM Posters and Demos, Part of SIGCOMM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Securing web applications with predicate access control

Yang, Z. & Levchenko, K., Jan 1 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer-Verlag Berlin Heidelberg, p. 541-554 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild

Farinholt, B., Rezaeirad, M., Pearce, P., Dharmdasani, H., Yin, H., Blond, S. L., McCoy, D. & Levchenko, K., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 770-787 18 p. 7958609. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tools for automated analysis of cybercriminal markets

Portnoff, R. S., Kummerfeld, J. K., Afroz, S., Berg-Kirkpatrick, T., Durrett, G., McCoy, D., Levchenko, K. & Paxson, V., Jan 1 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 657-666 10 p. 3052600. (26th International World Wide Web Conference, WWW 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

A fistful of Bitcoins: Characterizing payments among men with no names

Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K. I., McCoy, D., Voelker, G. M. & Savage, S., Apr 2016, In : Communications of the ACM. 59, 4, p. 86-93 8 p.

Research output: Contribution to journalArticle

2015

Security by any other name: On the effectiveness of provider based email security

Foster, I., Larson, J., Masich, M., Snoeren, A. C., Savage, S. & Levchenko, K., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 450-463 14 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Characterizing large-scale click fraud in zeroaccess

Pearce, P., Dave, V., Grier, C., Levchenko, K., Guha, S., McCoy, D., Paxson, V., Savage, S. & Voelker, G. M., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 141-152 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On the security of mobile cockpit information systems

Lundberg, D., Farinholt, B., Sullivan, E., Mast, R., Checkoway, S., Savage, S., Snoeren, A. C. & Levchenko, K., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 633-645 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

XXXtortion? Inferring registration intent in the .XXX TLD

Halvorson, T., Levchenko, K., Savage, S. & Voelker, G. M., Apr 7 2014, WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 901-911 11 p. (WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

A comparison of syslog and IS-IS for network failure analysis

Turner, D., Levchenko, K., Savage, S. & Snoeren, A. C., 2013, IMC 2013 - Proceedings of the 13th ACM Internet Measurement Conference. p. 433-439 7 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A fistful of bitcoins: Characterizing payments among men with no names

Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M. & Savage, S., Dec 16 2013, IMC 2013 - Proceedings of the 13th ACM Internet Measurement Conference. p. 127-139 13 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Manufacturing compromise: The emergence of exploit-as-a-service

Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C. J., Levchenko, K., Mavrommatis, P., McCoy, D., Nappa, A., Pitsillidis, A., Provos, N., Rafique, M. Z., Rajab, M. A., Rossow, C., Thomas, K., Paxson, V., Savage, S. & Voelker, G. M., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 821-832 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On failure in managed enterprise networks

Turner, D., Levchenko, K., Mogul, J. C., Savage, S. & Snoeren, A. C., May 24 2012, In : HP Laboratories Technical Report. 101

Research output: Contribution to journalArticle

PharmaLeaks: Understanding the business of online pharmaceutical affiliate programs

McCoy, D., Pitsillidis, A., Jordan, G., Weaver, N., Kreibich, C., Krebs, B., Voelker, G. M., Savage, S. & Levchenko, K., 2012, p. 1-16. 16 p.

Research output: Contribution to conferencePaper

Proximax: Measurement-driven proxy dissemination

McCoy, D., Morales, J. A. & Levchenko, K., Feb 21 2012, Financial Cryptography and Data Security - 15th International Conference, FC 2011, Revised Selected Papers. p. 260-267 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7035 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Router support for fine-grained latency measurements

Kompella, R. R., Levchenko, K., Snoeren, A. C. & Varghese, G., Jun 1 2012, In : IEEE/ACM Transactions on Networking. 20, 3, p. 811-824 14 p., 6093710.

Research output: Contribution to journalArticle

Taster's choice: A comparative analysis of spam feeds

Pitsillidis, A., Kanich, C., Voelker, G. M., Levchenko, K. & Savage, S., 2012, IMC 2012 - Proceedings of the ACM Internet Measurement Conference. p. 427-440 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The BIZ top-level domain: Ten years later

Halvorson, T., Szurdi, J., Maier, G., Felegyhazi, M., Kreibich, C., Weaver, N., Levchenko, K. & Paxson, V., Apr 2 2012, Passive and Active Measurement - 13th International Conference, PAM 2012, Proceedings. p. 221-230 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7192 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

An analysis of underground forums

Motoyama, M., McCoy, D., Levchenko, K., Savage, S. & Voelker, G. M., Dec 12 2011, IMC'11 - Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference. p. 71-79 9 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Click trajectories: End-to-end analysis of the spam value chain

Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Félegyházi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G. M. & Savage, S., 2011, Proceedings - 2011 IEEE Symposium on Security and Privacy, SP 2011. p. 431-446 16 p. 5958044. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dirty jobs: The role of freelance labor in web service abuse

Motoyama, M., McCoy, D., Levchenko, K., Savage, S. & Voelker, G. M., Jan 1 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 203-218 16 p. (Proceedings of the 20th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Show me the money: Characterizing spam-advertised revenue

Kanich, C., Weaver, N., McCoy, D., Halvorson, T., Kreibich, C., Levchenko, K., Paxson, V., Voelker, G. M. & Savage, S., Jan 1 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 219-233 15 p. (Proceedings of the 20th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

California fault lines: Understanding the causes and impact of network failures

Turner, D., Levchenko, K., Snoeren, A. C. & Savage, S., Nov 15 2010, SIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference. p. 315-326 12 p. (SIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

California fault lines: Understanding the causes and impact of network failures

Turner, D., Levchenko, K., Snoeren, A. C. & Savage, S., Dec 1 2010, In : Computer Communication Review. 40, 4, p. 315-326 12 p.

Research output: Contribution to journalArticle

Re: Captchas – Understanding CAPTCHA-solving services in an economic context

Motoyama, M., Levchenko, K., Kanich, C., McCoy, D., Voelker, G. M. & Savage, S., Jan 1 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 435-452 18 p. (Proceedings of the 19th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Every microsecond counts: Tracking fine-grain latencies with a lossy difference aggregator

Kompella, R. R., Levchenko, K., Snoeren, A. C. & Varghese, G., Nov 30 2009, In : Computer Communication Review. 39, 4, p. 255-266 12 p.

Research output: Contribution to journalConference article

Spamalytics: An empirical analysis of spam marketing conversion

Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G. M., Paxson, V. & Savage, S., Sep 1 2009, In : Communications of the ACM. 52, 9, p. 99-107 9 p.

Research output: Contribution to journalArticle

2008

Spamalytics: An empirical analysis of spam marketing conversion

Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G. M., Paxsonf, V. & Savage, S., Dec 1 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 3-14 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Xl: An efficient network routing algorithm

Levchenko, K., Voelker, G. M., Paturi, R. & Savage, S., Dec 1 2008, In : Computer Communication Review. 38, 4, p. 15-26 12 p.

Research output: Contribution to journalConference article

2006

Unexpected means of protocol inference

Ma, J., Levchenko, K., Kreibich, C., Savage, S. & Voelker, G. M., Dec 1 2006, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006. p. 313-326 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2005

Improved range-summable random variable construction algorithms

Calderbank, A. R., Gilbert, A., Levchenko, K., Muthukrishnan, S. & Strauss, M., Jul 1 2005, p. 840-849. 10 p.

Research output: Contribution to conferencePaper

2004

On the difficulty of scalably detecting network attacks

Levchenko, K., Paturi, R. & Varghese, G., Dec 1 2004, In : Proceedings of the ACM Conference on Computer and Communications Security. p. 12-20 9 p.

Research output: Contribution to journalConference article