Kirill Igorevich Levchenko

20042019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2004 2019

  • 28 Conference contribution
  • 5 Article
  • 3 Conference article
  • 1 Paper
Filter
Conference contribution
2019

SparSDR: Sparsity-proportional Backhaul and Compute for SDRs

Khazraee, M., Guddeti, Y., Crow, S., Snoeren, A. C., Levchenko, K. I., Bharadia, D. & Schulman, A., Jun 12 2019, MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 391-403 13 p. (MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Radio receivers
Bandwidth
Processing
Internet
Network protocols
2018

Estimating Profitability of Alternative Cryptocurrencies (Short Paper)

Huang, D. Y., Levchenko, K. I. & Snoeren, A. C., Jan 1 2018, Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers. Meiklejohn, S. & Sako, K. (eds.). Springer-Verlag, p. 409-419 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10957 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Profitability
Mining
Alternatives
Currency
Volatiles

Tracking Ransomware End-to-end

Huang, D. Y., Aliapoulios, M. M., Li, V. G., Invernizzi, L., Bursztein, E., McRoberts, K., Levin, J., Levchenko, K. I., Snoeren, A. C. & McCoy, D., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 618-631 14 p. 8418627. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telemetering
Malware
Ecosystems
Seed

Uncovering bugs in P4 programs with assertion-based verification

Freire, L., Neves, M., Leal, L., Levchenko, K., Schaeffer-Filho, A. & Barcellos, M., Mar 28 2018, Proceedings of the Symposium on SDN Research, SOSR 2018. Association for Computing Machinery, Inc, 3185499. (Proceedings of the Symposium on SDN Research, SOSR 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer programming languages
Defects
Software defined networking
2017

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles

Contag, M., Li, G., Pawlowski, A., Domke, F., Levchenko, K., Holz, T. & Savage, S., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 231-250 20 p. 7958580. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Firmware
Automobiles
Engines
Environmental regulations
Static analysis

Identifying products in online cybercrime marketplaces: A Dataset for fine-grained domain adaptation

Durrett, G., Kummerfeld, J. K., Berg-Kirkpatrick, T., Portnoff, R. S., Afroz, S., McCoy, D., Levchenko, K. I. & Paxson, V., Jan 1 2017, EMNLP 2017 - Conference on Empirical Methods in Natural Language Processing, Proceedings. Association for Computational Linguistics (ACL), p. 2598-2607 10 p. (EMNLP 2017 - Conference on Empirical Methods in Natural Language Processing, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supervised learning

PacketLab: A universal measurement endpoint interface

Levchenko, K. I., Dhamdhere, A., Huffaker, B., Claffy, K., Allman, M. & Paxson, V., Nov 1 2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. Association for Computing Machinery, p. 254-260 7 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC; vol. Part F131937).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Internet
Experiments

Pinning down abuse on Google maps

Huang, D. Y., Grundman, D., Thomas, K., Kumar, A., Bursztein, E., Levchenko, K. I. & Snoeren, A. C., Jan 1 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 1471-1479 9 p. 3052590

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Siphons
Hotels
Search engines
Drug products

Quantifying the pressure of legal risks on third-party vulnerability research

Gamero-Garrido, A., Savage, S., Levchenko, K. & Snoeren, A. C., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1501-1513 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chilling
Industry

Sandboxing data plane programs for fun and profit

Neves, M., Levchenko, K. I. & Barcellos, M., Aug 22 2017, SIGCOMM Posters and Demos 2017 - Proceedings of the 2017 SIGCOMM Posters and Demos, Part of SIGCOMM 2017. Association for Computing Machinery, Inc, p. 103-104 2 p. (SIGCOMM Posters and Demos 2017 - Proceedings of the 2017 SIGCOMM Posters and Demos, Part of SIGCOMM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supervisory personnel
Profitability

Securing web applications with predicate access control

Yang, Z. & Levchenko, K. I., Jan 1 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer-Verlag, p. 541-554 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web Application
Access Control
Access control
Predicate
Control Policy

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild

Farinholt, B., Rezaeirad, M., Pearce, P., Dharmdasani, H., Yin, H., Blond, S. L., McCoy, D. & Levchenko, K. I., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 770-787 18 p. 7958609. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Experiments
Malware
Botnet

Tools for automated analysis of cybercriminal markets

Portnoff, R. S., Kummerfeld, J. K., Afroz, S., Berg-Kirkpatrick, T., Durrett, G., McCoy, D., Levchenko, K. & Paxson, V., Jan 1 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 657-666 10 p. 3052600. (26th International World Wide Web Conference, WWW 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Processing
2015

Security by any other name: On the effectiveness of provider based email security

Foster, I., Larson, J., Masich, M., Snoeren, A. C., Savage, S. & Levchenko, K., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 450-463 14 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Active networks
Network protocols
Servers
Internet
2014

Characterizing large-scale click fraud in zeroaccess

Pearce, P., Dave, V., Grier, C., Levchenko, K., Guha, S., McCoy, D., Paxson, V., Savage, S. & Voelker, G. M., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 141-152 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
Telemetering
Ecosystems
Lenses
Botnet

On the security of mobile cockpit information systems

Lundberg, D., Farinholt, B., Sullivan, E., Mast, R., Checkoway, S., Savage, S., Snoeren, A. C. & Levchenko, K. I., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 633-645 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cockpits (aircraft)
Application programs
Aviation
Information systems
Software reliability

XXXtortion? Inferring registration intent in the .XXX TLD

Halvorson, T., Levchenko, K., Savage, S. & Voelker, G. M., Apr 7 2014, WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 901-911 11 p. (WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trademarks
Information use
World Wide Web
Availability
Industry
2013

A comparison of syslog and IS-IS for network failure analysis

Turner, D., Levchenko, K. I., Savage, S. & Snoeren, A. C., Dec 16 2013, IMC 2013 - Proceedings of the 13th ACM Internet Measurement Conference. p. 433-439 7 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Failure analysis
Routers

A fistful of bitcoins: Characterizing payments among men with no names

Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M. & Savage, S., Dec 16 2013, IMC 2013 - Proceedings of the 13th ACM Internet Measurement Conference. p. 127-139 13 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Purchasing
2012

Manufacturing compromise: The emergence of exploit-as-a-service

Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C. J., Levchenko, K., Mavrommatis, P., McCoy, D., Nappa, A., Pitsillidis, A., Provos, N., Rafique, M. Z., Rajab, M. A., Rossow, C., Thomas, K., Paxson, V., Savage, S. & Voelker, G. M., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 821-832 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Ecosystems
Malware

Proximax: Measurement-driven proxy dissemination

McCoy, D., Morales, J. A. & Levchenko, K. I., Feb 21 2012, Financial Cryptography and Data Security - 15th International Conference, FC 2011, Revised Selected Papers. p. 260-267 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7035 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Server
Leverage
Maximise
Internet

Taster's choice: A comparative analysis of spam feeds

Pitsillidis, A., Kanich, C., Voelker, G. M., Levchenko, K. & Savage, S., Dec 17 2012, IMC 2012 - Proceedings of the ACM Internet Measurement Conference. p. 427-440 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail

The BIZ top-level domain: Ten years later

Halvorson, T., Szurdi, J., Maier, G., Felegyhazi, M., Kreibich, C., Weaver, N., Levchenko, K. & Paxson, V., Apr 2 2012, Passive and Active Measurement - 13th International Conference, PAM 2012, Proceedings. p. 221-230 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7192 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trademarks
Alternatives
Registration
Web crawler
2011

An analysis of underground forums

Motoyama, M., McCoy, D., Levchenko, K., Savage, S. & Voelker, G. M., Dec 12 2011, IMC'11 - Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference. p. 71-79 9 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sales
Communication

Click trajectories: End-to-end analysis of the spam value chain

Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Félegyházi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G. M. & Savage, S., Aug 29 2011, Proceedings - 2011 IEEE Symposium on Security and Privacy, SP 2011. p. 431-446 16 p. 5958044. (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trajectories
Industry
Electronic mail
Drug products
Websites
2010

California fault lines: Understanding the causes and impact of network failures

Turner, D., Levchenko, K. I., Snoeren, A. C. & Savage, S., Nov 15 2010, SIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference. p. 315-326 12 p. (SIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Fault
Network components
Line
Electronic mail
2008

Spamalytics: An empirical analysis of spam marketing conversion

Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G. M., Paxsonf, V. & Savage, S., Dec 1 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 3-14 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
Sales
Infiltration
Drug products
Botnet
2006

Unexpected means of protocol inference

Ma, J., Levchenko, K., Kreibich, C., Savage, S. & Voelker, G. M., Dec 1 2006, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006. p. 313-326 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Managers