Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paul Pearce is active.

Publication


Featured researches published by Paul Pearce.


ieee symposium on security and privacy | 2015

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications

Kurt Thomas; Elie Bursztein; Chris Grier; Grant Ho; Nav Jagpal; Alexandros Kapravelos; Damon McCoy; Antonio Nappa; Vern Paxson; Paul Pearce; Niels Provos; Moheeb Abu Rajab

Today, web injection manifests in many forms, but fundamentally occurs when malicious and unwanted actors tamper directly with browser sessions for their own profit. In this work we illuminate the scope and negative impact of one of these forms, ad injection, in which users have ads imposed on them in addition to, or different from, those that websites originally sent them. We develop a multi-staged pipeline that identifies ad injection in the wild and captures its distribution and revenue chains. We find that ad injection has entrenched itself as a cross-browser monetization platform impacting more than 5% of unique daily IP addresses accessing Google -- tens of millions of users around the globe. Injected ads arrive on a clients machine through multiple vectors: our measurements identify 50,870 Chrome extensions and 34,407 Windows binaries, 38% and 17% of which are explicitly malicious. A small number of software developers support the vast majority of these injectors who in turn syndicate from the larger ad ecosystem. We have contacted the Chrome Web Store and the advertisers targeted by ad injectors to alert each of the deceptive practices involved.


ieee symposium on security and privacy | 2017

Augur: Internet-Wide Detection of Connectivity Disruptions

Paul Pearce; Roya Ensafi; Frank Li; Nick Feamster; Vern Paxson

Anecdotes, news reports, and policy briefings collectively suggest that Internet censorship practices are pervasive. The scale and diversity of Internet censorship practices makes it difficult to precisely monitor where, when, and how censorship occurs, as well as what is censored. The potential risks in performing the measurements make this problem even more challenging. As a result, many accounts of censorship begin—and end—with anecdotes or short-term studies from only a handful of vantage points. We seek to instead continuously monitor information about Internet reachability, to capture the onset or termination of censorship across regions and ISPs. To achieve this goal, we introduce Augur, a method and accompanying system that utilizes TCP/IP side channels to measure reachability between two Internet locations without directly controlling a measurement vantage point at either location. Using these side channels, coupled with techniques to ensure safety by not implicating individual users, we develop scalable, statistically robust methods to infer network-layer filtering, and implement a corresponding system capable of performing continuous monitoring of global censorship. We validate our measurements of Internet-wide disruption in nearly 180 countries over 17 days against sites known to be frequently blocked, we also identify the countries where connectivity disruption is most prevalent.


ieee symposium on security and privacy | 2018

Toward Continual Measurement of Global Network-Level Censorship

Paul Pearce; Roya Ensafi; Frank Li; Nick Feamster; Vern Paxson

Many accounts of censorship begin—and end—with anecdotes or short-term studies from a handful of vantage points. To enable continuous measurement of network-level censorship on an Internet-wide basis, Augur leverages TCP/IP side channels to measure reachability between two Internet locations from off-path third-party vantage points.


computer and communications security | 2012

AdDroid: privilege separation for applications and advertisers in Android

Paul Pearce; Adrienne Porter Felt; Gabriel Nunez; David A. Wagner


international conference on detection of intrusions and malware and vulnerability assessment | 2011

What's clicking what? techniques and innovations of today's clickbots

Brad Miller; Paul Pearce; Chris Grier; Christian Kreibich; Vern Paxson


computer and communications security | 2014

Characterizing Large-Scale Click Fraud in ZeroAccess

Paul Pearce; Vacha Dave; Chris Grier; Kirill Levchenko; Saikat Guha; Damon McCoy; Vern Paxson; Stefan Savage; Geoffrey M. Voelker


Proceedings of the Applied Networking Research Workshop on | 2018

Characterizing the Nature and Dynamics of Tor Exit Blocking

Rachee Singh; Rishab Nithyanand; Sadia Afroz; Paul Pearce; Michael Carl Tschantz; Phillipa Gill; Vern Paxson


Archive | 2013

The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules

Paul Pearce; Chris Grier; Vern Paxson; Vacha Dave; Damon McCoy; Geoffrey M. Voelker; Stefan Savage


ieee symposium on security and privacy | 2017

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild

Brown Farinholt; Mohammad Rezaeirad; Paul Pearce; Hitesh Dharmdasani; Haikuo Yin; Stevens Le Blond; Damon McCoy; Kirill Levchenko


usenix security symposium | 2017

Global Measurement of DNS Manipulation.

Paul Pearce; Ben Jones; Frank Li; Roya Ensafi; Nick Feamster; Nicholas Weaver; Vern Paxson

Collaboration


Dive into the Paul Pearce's collaboration.

Top Co-Authors

Avatar

Vern Paxson

University of California

View shared research outputs
Top Co-Authors

Avatar

Damon McCoy

George Mason University

View shared research outputs
Top Co-Authors

Avatar

Chris Grier

University of California

View shared research outputs
Top Co-Authors

Avatar

Frank Li

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge