Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, more successful with every passing day. Defending against this crime requires new tools and methods to map and quantify the malicious ecosystems that threat actors set up to realize their attacks. Since there exist no silver bullets, a single tool or a single method cannot be applied to all types of malicious ecosystems which vary in their size, mechanisms, and operations. In this dissertation, we introduce a wide range of empirical methods which we use to conduct large-scale systematic studies of multiple malicious ecosystems. We start by performing an in-depth longitudinal study of a prevalent social-engineering attack, namely technical suppor...
It is becoming increasingly difficult to ignore the importance of using online social networks (OSNs...
The Internet is a dangerous place, filled with dierent cyber threats, including malware. To withstan...
The Web has evolved from a handful of static web pages to billions of dynamic and interactive web pa...
© 2017, Springer International Publishing AG. This study extensively scrutinizes 14, months of regis...
The Domain Name System (DNS) is a fundamental element of today's Internet. Virtually all online conn...
Large-scale online scam campaigns pose a significant security threat to casual Internet users. Attac...
The Internet is rife with abuse: examples include spam, phishing, malicious advertising, DNS abuse,...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
Abstract—Malicious Web activities continue to be a major threat to the safety of online Web users. D...
Large-scale Internet attacks are pervasive. A broad spectrum of actors from organized gangs of crimi...
Wang, HainingNumerous efforts have been devoted to securing computer systems in the past decade, whi...
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. T...
Cybercriminals misuse accounts on online services (e.g., webmails and online social networks) to per...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
In this thesis, we present advanced techniques to approach some of the problems caused by cybercrimi...
It is becoming increasingly difficult to ignore the importance of using online social networks (OSNs...
The Internet is a dangerous place, filled with dierent cyber threats, including malware. To withstan...
The Web has evolved from a handful of static web pages to billions of dynamic and interactive web pa...
© 2017, Springer International Publishing AG. This study extensively scrutinizes 14, months of regis...
The Domain Name System (DNS) is a fundamental element of today's Internet. Virtually all online conn...
Large-scale online scam campaigns pose a significant security threat to casual Internet users. Attac...
The Internet is rife with abuse: examples include spam, phishing, malicious advertising, DNS abuse,...
The widespread access to the Internet and the ubiquity of web-based services make it easy to communi...
Abstract—Malicious Web activities continue to be a major threat to the safety of online Web users. D...
Large-scale Internet attacks are pervasive. A broad spectrum of actors from organized gangs of crimi...
Wang, HainingNumerous efforts have been devoted to securing computer systems in the past decade, whi...
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. T...
Cybercriminals misuse accounts on online services (e.g., webmails and online social networks) to per...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
In this thesis, we present advanced techniques to approach some of the problems caused by cybercrimi...
It is becoming increasingly difficult to ignore the importance of using online social networks (OSNs...
The Internet is a dangerous place, filled with dierent cyber threats, including malware. To withstan...
The Web has evolved from a handful of static web pages to billions of dynamic and interactive web pa...