Framing Dependencies Introduced by Underground Commoditization

@inproceedings{Thomas2015FramingDI,
  title={Framing Dependencies Introduced by Underground Commoditization},
  author={Kurt Thomas and Danny Yuxing Huang and David Y. Wang and Elie Bursztein and Chris Grier and Tom Holt and Christopher Kr{\"u}gel and Damon McCoy and Stefan Savage and Giovanni Vigna},
  booktitle={WEIS},
  year={2015}
}
Internet crime has become increasingly dependent on the underground economy: a loose federation of specialists selling capabilities, services, and resources explicitly tailored to the abuse ecosystem. Through these emerging markets, modern criminal entrepreneurs piece together dozens of a la carte components into entirely new criminal endeavors. From an abuse fighting perspective, criminal reliance on this black market introduces fragile dependencies that, if disrupted, undermine entire… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 58 CITATIONS

iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network

  • 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
  • 2018
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

An Analysis of Pay-per-install Economics Using Entity Graphs

VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2015
2019

CITATION STATISTICS

  • 5 Highly Influenced Citations

  • Averaged 14 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 153 REFERENCES

Characterizing Large-Scale Click Fraud in ZeroAccess

  • ACM Conference on Computer and Communications Security
  • 2014
VIEW 6 EXCERPTS

The Underground Economy of Fake Antivirus Software

Brett Stone-Gross, Ryan Abman, +3 authors Giovanni Vigna
  • WEIS
  • 2011
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Click farms are the new sweatshops

Lydia DePillis
  • http: //wapo.st/1bKLYVg,
  • 2014
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Ransomware that demands Bitcoins is distributed by malware that steals bitcoins

Lucian Constantin
  • http://bit. ly/1u24YfL,
  • 2014
VIEW 2 EXCERPTS
HIGHLY INFLUENTIAL

@spam: the Underground on 140 Characters or Less

  • ACM Conference on Computer and Communications Security
  • 2010
VIEW 5 EXCERPTS