Chris Kanich
Orcid: 0000-0002-3836-2168
According to our database1,
Chris Kanich
authored at least 61 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies.
Proc. Priv. Enhancing Technol., 2024
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
2023
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies.
CoRR, 2023
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Equity and Access in Algorithms, Mechanisms, and Optimization, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018
Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
The costs and benefits of treating the browser like an operating system: how ad blockers help us better understand how different browser features are used and who they benefit.
SIGCAS Comput. Soc., 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Characterizing the impact of malware infections and remediation attempts through support forum analysis.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
J. Cybersecur., 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
Proceedings of the CCSW'13, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
PhD thesis, 2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
2009
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009
2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008