• Publications
  • Influence
Prospex: Protocol Specification Extraction
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very useful in a number of security-related contexts, forExpand
  • 222
  • 14
A Practical Attack to De-anonymize Social Network Users
Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates and have millions of registered users. In this paper, we introduce a novel de-anonymizationExpand
  • 333
  • 13
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-related contexts. ForExpand
  • 199
  • 11
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting
Piracy is a mass phenomenon on the Internet today. Various file sharing platforms offer free access to unauthorised copies of copyrighted works such as media content and software. Copyright holdersExpand
  • 30
  • 6
Social snapshots: digital forensics for online social networks
Recently, academia and law enforcement alike have shown a strong demand for data that is collected from online social networks. In this work, we present a novel method for harvesting such data fromExpand
  • 68
  • 4
Is the Internet for Porn? An Insight Into the Online Adult Industry
The online adult industry is among the most profitable business branches on the Internet, and its web sites attract large amounts of visitors and traffic. Nevertheless, no study has yet characterizedExpand
  • 56
  • 1
Vanity, cracks and malware: insights into the anti-copy protection ecosystem
Today, a large amount of software products include mechanisms to counter software piracy. However, most protection mechanisms can be easily circumvented by applying software patches (cracks) orExpand
  • 18
  • 1
Covertly Probing Underground Economy Marketplaces
Cyber-criminals around the world are using Internet-based communication channels to establish trade relationships and complete fraudulent transactions. Furthermore, they control and operate publiclyExpand
  • 45