ecrime 2013 Sept. 17, 2013 to Sept. 18, 2013, San Francisco, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Favicon -- a Clue to Phishing Sites Detection Wei Wang , Guanggang Geng , Xiaodong Li , Shian-shyong Tseng. Phishing is a type of scam designed to steal user's identity.Typically, anti-phishing methods either use ...
An Exploration of the Factors Affecting the Advertised Price For Stolen Data Thomas J. Holt , Olga Smirnova , Yi-ting Chua. A growing body of research has developed exploring the ways that data thieves dispose of ...
Voice of the Customer: What is the Real Experience? Brad Wardman , Lisa Kelly , Michael Weideman. Phishers continue to target customers of all factions of the Internet industry in an attempt ...
Folex: An Analysis of an Herbal and Counterfeit Luxury Goods Affiliate Program Mohammad Karami , Shiva Ghaemi , Damon Mccoy. The profitability of the underground criminal business of counterfeit or unauthorized products is a major ...
Phish-Net: Investigating Phish Clusters Using Drop Email Addresses Jason Britt , Shams Zawoad , Ragib Hasan , Amit Dutta , Alan Sprague , Gary Warner. Phishing attacks continue to grow and criminals continue to prosper without fear of prosecution. Tools ...
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter Aditi Gupta , Hemank Lamba , Ponnurangam Kumaraguru. Online social media has emerged as one of the prominent channel for dissemination of information ...
Password Advice Shouldn't Be Boring: Visualizing Password Guessing Attacks Sonia Chiasson , Leah Zhang-kennedy , Robert Biddle. Users are susceptible to password guessing attacks when they create weak passwords. Despite an abundance ...
An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem Malte Möser, Rainer Böhme , Dominic Breuker. We provide a first systematic account of opportunities and limitations of anti-money laundering (AML) in ...
Honor Among Thieves: A Common's Analysis of Cybercrime Economies Rachel Greenstadt , Vaibhav Garg , Sadia Afroz , Damon Mccoy. Underground forums enable technical innovation amongst criminals as well as allow for specialization, thereby making ...
Monitoring a Fast Flux botnet using recursive and passive DNS: A case study Dhia Mahjoub. Despite having been around for years, fast flux is still being used by cybercriminals as ...
10v3.c0ns: A Criminological Investigation of Online Dating Crimes Aunshul Rege. The US online dating sector is worth $2billion and has 5.5 million active registered users. ...
Empirical Analysis of Factors Affecting Malware URL Detection Marie Vasek , Tyler Moore. Many organizations, from antivirus companies to motivated volunteers, maintain blacklists of URLs suspected of distributing ...
An Algebra for Describing the Steps in Indicator Expansion Jonathan Spring. Indicator expansion is a process of using one or more data sources to obtain more ...
Modeling Malicious Domain Name Take-down Dynamics: Why eCrime Pays Jonathan Spring. Domain names drive the ubiquitous use of the Internet. Criminals and adversaries also use domain ...