A N T I - A B U S E
Blog posts, Publications and Talks
031
Filter by

Rethinking the detection of child sexual abuse imagery on the internet
Talk - ai - Enigma 2019

Attacks against machine learning — an overview
Blog post - ai - May 2018

How to handle mistakes while using AI to block attacks
Blog post - ai - Apr 2018

Challenges faced while training an AI to combat abuse
Blog post - ai - Apr 2018

Why AI is the key to robust anti-abuse defenses
Blog post - ai - Apr 2018

How to successfully harness AI to combat fraud and abuse
Talk - ai - RSA 2018

Tracking desktop ransomware payments end to end
Publication - security - S&P 2018

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
Publication - anti-abuse - CCS 2017

Unmasking the ransomware kingpins
Blog post - security - Oct 2017

Exposing the inner-workings of the ransomware economy
Blog post - security - Sep 2017

How to trace ransomware payments end-to-end
Blog post - security - Aug 2017

Tracking desktop ransomware payments end to end
Talk - security - BH USA 2017

Pinning Down Abuse on Google Maps
Publication - anti-abuse - WWW 2017

Targeted Attack Against Corporate Inboxes A Gmail Perspective
Talk - network security - RSA 2017

Picasso: Lightweight Device Class Fingerprinting for Web Clients
Publication - anti-abuse - SPSM 2016

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
Publication - anti-abuse - RAID 2016

Investigating commercial pay-per-install and the distribution of unwanted software
Publication - anti-abuse - Usenix Security 2016

5 useful tips to bulletproof your credit cards against identity theft
Blog post - how-to - Jul 2016

Cloak of visibility: detecting when machines browse a different web
Publication - anti-abuse - S&P 2016

In-depth analysis of the lessons we learned while protecting gmail users
Blog post - anti-abuse - Apr 2016

Framing dependencies introduced by underground commoditization
Publication - anti-abuse - WEIS 2015

How phishing works
Blog post - anti-abuse - Aug 2015

Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google
Publication - anti-abuse - WWW 2015

Ad injection at scale: assessing deceptive advertisement modifications
Publication - anti-abuse - S&P 2015

Handcrafted fraud and extortion: manual account hijacking in the wild
Publication - anti-abuse - IMC 2014

Dialing back abuse on phone verified accounts
Publication - anti-abuse - CCS 2014

When a porn site masquerades as the apple app store
Blog post - anti-abuse - May 2013

18.4% of us internet users got at least one of their account compromised
Blog post - anti-abuse - Jan 2013

45% of the users found their email accounts more valuable than their bank accounts
Blog post - anti-abuse - May 2012

Google docs used in a spam campaign
Blog post - anti-abuse - Dec 2011

What phishing sites look like ? (study)
Blog post - anti-abuse - Nov 2011