ICSI, 1947 Center St., Suite 600,
Berkeley CA 94704
I received my Diplom in Computer Science
from TUM in 2002.
I then completed the Ph.D. program at the University of Cambridge
Computer Laboratory. There, I was one of the brains
Jon Crowcroft, my supervisor and pub coach.
In 2006 I moved on to ICSI's Networking and Security
group, where I am a senior research scientist. My
research focuses on topics in network monitoring,
distributed systems, and network security.
As of late 2012 I'm also the Director of Research
I'm German, though they say I have a sense of humor.
Conferences & Workshops
Current events underlined in yellow. PC memberships:
Chairing and other organizational work:
CoNEXT 2012, Travel Grant Chair
DIMVA 2010, PC Chair
RAID 2010, Publications Chair
SPW 2012, Treasurer & Registr. Chair
TMA 2013, Co-Chair
DIMVA Steering Committee
SPW Steering Committee
More papers, including forthcoming work.
Understanding the Domain Registration Behavior of Spammers
S. Hao, M. Thomas, V. Paxson, N. Feamster, C. Kreibich, C. Grier and S. Hollenbeck. (Long paper.) Internet Measurement Conference (IMC) 2013, Barcelona, Spain.
Fathom: A Browser-based Network Measurement Platform
M. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, V. Paxson. Internet Measurement Conference (IMC) 2012, Boston, MA, USA.
Fathom, a runner-up for best paper at IMC 2012,
directly into web
it out and build cool things with it!
Priceless: The Role of Payments in Abuse-advertised Goods
D. McCoy, H. Dharmdasani, C. Kreibich, G. Voelker, S. Savage. 19th ACM Conference on Computer and Communications Security (CCS), 16-18 October 2012, Raleigh, NC, USA.
This paper documents two years of experience in monitoring
payment networks for abuse-advertised goods and the efficacy
of payment-related interventions. For more details, take a
Brian Krebs's article on our work.
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. Voelker, S. Savage, K. Levchenko. USENIX Security Symposium, 2012, Bellevue/WA, USA.
This paper presents an in-depth look at the
business of rogue internet pharmacies.
article for a high-level summary.
Netalyzr » debug your internet (now on Android!)
Fathom » turn your browser into a measurement platform
Priv3 » practical third-party privacy for the social web
Click Trajectories » end-to-end analysis of the spam value chain
Spamalytics » measuring spam conversion
Bro » ultra-flexible traffic analysis
CCIED » fighting internet epidemics
Honeycomb » automatic signature generation
Interviews, press coverage, etc.
How spam works » a real-world spam transaction
Browser use over the course of a day
Rich Stevens' sock program
libstree » generic suffix trees
Netdude » pluggable trace manipulation
Broccoli » let Bro talk to anything
cache.h » an STL-style cache (painful!)
A parser for Google Scholar