Searched for: author%3A%22Moore%2C+Tyler%22
(1 - 3 of 3)
document
Anderson, Ross (author), Barton, Chris (author), Böhme, Rainer (author), Clayton, Richard (author), Hernandez Ganan, C. (author), Grasso, Tom (author), Levi, Michael (author), Moore, Tyler (author), Vasek, Marie (author)
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we report what has changed in the seven years since. The period has seen major platform evolution, with the mobile phone replacing the PC and laptop as the consumer terminal of choice, with Android replacing Windows, and with many services moving to the...
conference paper 2019
document
Tajalizadehkhoob, S. (author), Van Goethem, Tom (author), Korczynski, M.T. (author), Noroozian, A. (author), Böhme, Rainer (author), Moore, Tyler (author), Joosen, Wouter (author), van Eeten, M.J.G. (author)
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. Shared hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical...
conference paper 2017
document
Çetin, F.O. (author), Hanif Jhaveri, Mohammad (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author), Moore, Tyler (author)
Motivation: Participants on the front lines of abuse reporting have a variety of options to notify intermediaries and resource owners about abuse of their systems and services. These can include emails to personal messages to blacklists to machine-generated feeds. Recipients of these reports have to voluntarily act on this information. We know...
journal article 2016