Publications
Detecting Stepping Stones.
Proceedings of the Ninth USENIX Security Symposium.
(2000).
(2013).
(2009). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Detecting Backdoors.
Proceedings of the Ninth USENIX Security Symposium.
(2000). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019).
(2011).
(2011). Creating a Scalable Architecture for Internet Measurement.
Proceedings of the Internet Summit (INET '98).
(1998). On the Constancy of Internet Path Properties.
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop (IMW '01). 197-211.
(2001).
(2014).
(2012).
(2011). Characterizing the Nature and Dynamics of Tor Exit Blocking..
Proceedings of USENIX Security 2017.
(2017).
(2014). Characteristics of Internet Background Radiation.
Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
(2004). On the Characteristics and Origins of Internet Flow Rates.
Proceedings of the ACM SIGCOMM Conference. 309-322.
(2002). Censorship Arms Race: Research vs. Practice.
Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
(2015). On Calibrating Measurements of Packet Transit Times.
Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98). 11-21.
(1998).
(2009). Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic.
Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005). 267-272.
(2005). Bro: A System for Detecting Network Intruders in Real-Time.
Proceedings of the 7th USENIX Security Symposium.
(1998). A Brief History of Scanning.
77-82.
(2007).
(2010). Blocking-resistant communication through domain fronting.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
(2015).