| Exploiting Innocuous Activity for Correlating Users Across Sites | O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web | D. Akhawe, B. Amann, M. Vallentin, and R. Sommer | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Effective Straggler Mitigation: Attack of the Clones | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | To appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, Illinois | April 2013 | Networking | |
| Comments on Bufferbloat | M. Allman | ACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37 | January 2013 | Networking | [PDF]
|
| Findings and Implications from Data Mining the IMC Review Process | R. Beverly and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29 | January 2013 | Networking | [PDF]
|
| Fathom: A Browser-based Network Measurement Platform | M. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. Paxson | Proceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, Massachusetts | November 2012 | Networking | [PDF]
|
| Priceless: The Role of Payments in Abuse-Advertised Goods | D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage | Proceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North Carolina | October 2012 | Networking | |
| Manufacturing Compromise: The Emergence of Exploit-as-a-Service | C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker | Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North Carolina | October 2012 | Networking | [PDF]
|
| Content‐based Privacy for Consumer‐Produced Multimedia | A. Janin, G. Friedland, and R. Sommer | ICSI Technical Report TR-12-012 | October 2012 | Networking | [PDF]
|
| NOSIX: A Portable Switch Interface for the Network Operating System | A. Wundsam and M.Yu | ICSI Technical Report TR-12-013 | October 2012 | Networking | [PDF]
|
| Software-Defined Internet Architecture | B. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. Shenker | Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, Washington | October 2012 | Networking | [PDF]
|
| A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence | B. Amann, R. Sommer, A. Sharma, and S. Hall | Proceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the Netherlands | September 2012 | Networking | |
| Making the Internet More Evolvable | B. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. Shenker | ICSI Technical Report TR-12-011 | September 2012 | Networking | [PDF]
|
| PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko | Proceedings of the 21st USENIX Security Symposium, Bellevue, Washington | August 2012 | Networking | [PDF]
|
| Logically Centralized? State Distribution Tradeoffs in Software Defined Networks | D. Levin, A. Wundsam, B. Heller, N. Handigol, and A. Feldmann | Proceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Fabric: A Retrospective on Evolving SDN | M. Casado, T. Koponen, S. Shenker, and A. Tootoonchian | Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Fast and Interactive Analytics Over Hadoop Data with Spark | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | USENIX ;login:, Vol. 34, No. 4, pp. 45-51 | August 2012 | Networking | [PDF]
|
| Software-Defined Networking: History, Hype, and Hope | S. Shenker | Proceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012. | July 2012 | Networking | |
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, Massachusetts | June 2012 | Networking | [PDF]
|
| An Intermittent Energy Internet Architecture | B. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. Streed | Proceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, Spain | May 2012 | Networking | [PDF]
|
| Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen | Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79 | May 2012 | Networking | [PDF]
|
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| On Building Inexpensive Network Capabilities | C. Shue, A. Kalafut, M. Allman, and C. Taylor | ACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79 | April 2012 | Networking | [PDF]
|
| Carat: Collaborative Energy Bug Detection | A. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. Tarkoma | Poster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, California | April 2012 | Networking | |
| Adapting Social Spam Infrastructure for Political Censorship | K. Thomas, C. Grier, and V. Paxson | Proceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, California | April 2012 | Networking | [PDF]
|
| On Controller Performance in Software-Defined Networks | A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood | Proceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, California | April 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| The BIZ Top-Level Domain: Ten Years Later | T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. Paxson | Proceedings of the 13th Passive and Active Measurement Conference, Vienna, Austria | March 2012 | Networking | [PDF]
|
| Probe and Pray: Using UPnP for Home Network Measurements | L. DiCioccio, R. Teixeira, M. May, and C. Kreibich | Proceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, Austria | March 2012 | Networking | [PDF]
|
| Hold-On: Protecting Against On-Path DNS Poisoning | H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson | Proceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United Kingdom | March 2012 | Networking | [PDF]
|
| Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community | M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, California | January 2012 | Networking | [PDF]
|
| TCP Fast Open | S. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and B. Raghavan | Proceedings of the 7th International Conference on emerging Network EXperiments and Technologies (ACM CoNEXT 2011), Tokyo, Japan | December 2011 | Networking | [PDF]
|
| Information-Centric Networking: Seeing the Forest for the Trees | A. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. Wilcox | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| Intelligent Design Enables Architectural Evolution | A. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. Wilcox | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| The Energy and Emergy of the Internet | B. Raghavan and J. Ma | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| Data-Driven Network Connectivity | J. Liu, S. Shenker, M. Schapira, and B. Yang | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| Suspended Accounts in Retrospect: An Analysis of Twitter Spam | K. Thomas, C. Grier, V. Paxson, and D. Song | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany | November 2011 | Networking | [PDF]
|
| GQ: Practical Containment for Measuring Modern Malware Systems | C. Kreibich, N. Weaver, C. Kanich, W. Cui, V. Paxson | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002. | November 2011 | Networking | |
| Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy | G. Friedland, G. Maier, R. Sommer, and N. Weaver | Proceedings of the New Security Paradigms Workshop (NSPW), Marin County, California | September 2011 | Networking | [PDF]
|
| Spam Detection Using Web Page Content: A New Battleground | M. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. Hoepers | Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia. | September 2011 | Networking | [PDF]
|
| Networking in the Long Emergency | B. Raghavan and J. Ma | Proceedings of the ACM SIGCOMM Workshop on Green Networking (GreenNet '11), Ontario, Canada, pp. 37-42 | August 2011 | Networking | [PDF]
|
| Measuring Pay-per-Install: The Commoditization of Malware Distribution | J. Cabellero, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Show Me the Money: Characterizing Spam-Advertised Revenue | C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| On Preserving Privacy in Information-Centric Networks | S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24 | August 2011 | Networking | [PDF]
|
| Reflections on Measurement Research: Crooked Lines, Straight Lines, and Moneyshots | V. Paxson | Keynote talk at the ACM Special Interest Group on Data Communications Conference (SIGCOMM 2011), Toronto, Canada | August 2011 | Networking | |
| Experiences from Netalyzr with Engaging Users in End-System Measurement | C. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. Paxson | Proceedings of ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), pp. 25-30, Toronto, Canada. | August 2011 | Networking | [PDF]
|
| Redirecting DNS for Ads and Profit | N. Weaver, C. Kreibich, and V. Paxson | Proceedings of the 20th USENIX Security Symposium's Workshop on Free and Open Communications on the Internet (FOCI '11), San Francisco, California | August 2011 | Networking | [PDF]
|