Publication Search Results

TitleAuthorsort ascendingBibliographicDateGroupLinks
Priceless: The Role of Payments in Abuse-Advertised GoodsD. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. SavageProceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North CarolinaOctober 2012Networking
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsD. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. LevchenkoProceedings of the 21st USENIX Security Symposium, Bellevue, WashingtonAugust 2012Networking[PDF]

Congestion Control Without a Startup PhaseD. Liu, M. Allman, S. Jin, and L. WangProceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, CaliforniaFebruary 2007Networking[PDF]

Logically Centralized? State Distribution Tradeoffs in Software Defined NetworksD. Levin, A. Wundsam, B. Heller, N. Handigol, and A. FeldmannProceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, FinlandAugust 2012Networking[PDF]

Internet Congestion Control for High Bandwidth-Delay Product EnvironmentsD. Katabi, M. Handley, and C. RohrsProceedings of ACM SIGCOMM 2002. 2002Networking
OCALA: An Architecture for Supporting Legacy Applications Over OverlaysD. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. WehrleProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280May 2006Networking[PDF]

Replay Debugging for Distributed ApplicationsD. Geels, G. Altekar, S. Shenker, and I. StoicaProceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300May 2006Networking[PDF]

Network Visualization with the Nam, VINT Network AnimatorD. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. YuIEEE Computer, 33(11), 63-68, November 2000.November 2000Networking
A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast RoutingD. Estrin, M. Handley, A. Helmy, P. Huang, and D. ThalerProceedings of Infocom 1999. 1999Networking
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable DelayD. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. StanifordProceedings of RAID, 2002. 2002Networking
Towards a Sensor Network Architecture: Lowering the WaistlineD. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. ZhaoProceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24June 2005Networking
The Design and Implementation of a Declarative Sensor Network SystemD. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, CaliforniaOctober 2006Networking
Flexibility as an Instrument in DRM SystemsD. Bergemann, T. Eisenbach, J. Feigenbaum, and S. ShenkerProceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005), Cambridge, MassachusettsJune 2005Networking[PDF]

Towards an Economic Analysis of Trusted Systems (Position Paper)D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithProceedings of the Third Workshop on Economics and Information Security, Minneapolis, MinnesotaMay 2004Networking[PDF]

Towards an Economic Analysis of Trusted SystemsD. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithPresented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Dynamic Behavior of Slowly-Responsive Congestion Control AlgorithmsD. Bansal, H. Balakrishnan, S. Floyd, and S. ShenkerSIGCOMM 2001 2001Networking
Accountable Internet Protocol (AIP)D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350August 2008Networking[PDF]

Holding the Internet AccountableD. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the WebD. Akhawe, B. Amann, M. Vallentin, and R. SommerTo appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, BrazilMay 2013Networking
A Tool for Debugging Internet Multicast RoutingD. Agarwal and S. FloydProceedings of the 22nd Annual ACM Computer Science Conference (CSC '94), Phoenix, ArizonaMarch 1994Networking
A Modular Network Layer for SensornetsC.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. StoicaProceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262November 2006Networking[PDF]

Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al EncaminarC.M. Yago, P. M. Ruiz, and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Local error recovery in SRM: comparison of two approachesC.G. Liu, D. Estrin, S. Shenker, and L. ZhangProceedings of IEEE/ACM Transactions on Networking, Vol. 6, pp. 686-699December 1998Networking
Distributed Segment Tree: Support Range Query and Cover Query over DHTC. Zheng, G. Shen, S. Li, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Insights from the Inside: A View of Botnet Management from InfiltrationC. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. SongProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

Resolving Inter-Domain Policy DisputesC. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168August 2007Networking[PDF]

Practical Data-Centric StorageC. T. Ee, S. Ratnasamy, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338May 2006Networking[PDF]

On Building Inexpensive Network CapabilitiesC. Shue, A. Kalafut, M. Allman, and C. TaylorACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79April 2012Networking[PDF]

Prudent Practices for Designing Malware Experiments: Status Quo and OutlookC. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van SteenProceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79May 2012Networking[PDF]

Detecting In-Flight Page Changes with Web TripwiresC. Reis, S. Gribble, T. Kohno, and N. WeaverProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44April 2008Networking[PDF]

The Internet Under Crisis Conditions: Learning From September 11C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. BriscoeComputer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC 2002Networking[PDF]

Report of the NSF Scalable Information Infrastructure WorkshopC. Partridge, et al.October 07 1998Networking
A Swifter Start for TCPC. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. SterbenzTechnical Report No. 8339, BBN Technologies, March 2002March 2002Networking
Using Strongly Typed Networking to Architect for TussleC. Muthukrishnan, V. Paxson, M. Allman, and A. AkellaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9October 2010Networking[PDF]

Detecting and Analyzing Automated Activity on TwitterC. M. Zhang and V. PaxsonProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Experiences from Netalyzr with Engaging Users in End-System MeasurementC. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. PaxsonProceedings of ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), pp. 25-30, Toronto, Canada.August 2011Networking[PDF]

GQ: Practical Containment for Measuring Modern Malware SystemsC. Kreibich, N. Weaver, C. Kanich, W. Cui, V. PaxsonProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002.November 2011Networking
Netalyzr: Illuminating The Edge NetworkC. Kreibich, N. Weaver, B. Nechaev, and V. PaxsonProceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259November 2010Networking[PDF]

On the Spam Campaign TrailC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, CaliforniaApril 2008Networking[PDF]

Spamcraft: An Inside Look At Spam Campaign OrchestrationC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, MassachusettsApril 2009Networking[PDF]

Policy-Controlled Event Management for Distributed Intrusion DetectionC. Kreibich and R. SommerProceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391June 2005Networking[PDF]

Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, GermanyC. Kreibich and M. Jahnke, eds.Springer 2010Networking
Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Show Me the Money: Characterizing Spam-Advertised RevenueC. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. SavageProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Spamalytics: An Empirical Analysis of Spam Marketing ConversionC. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009October 2008Networking[PDF]

Manufacturing Compromise: The Emergence of Exploit-as-a-ServiceC. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. VoelkerProceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North CarolinaOctober 2012Networking[PDF]

@spam: The Underground on 140 Characters or LessC. Grier, K. Thomas, V. Paxson, and M. ZhangProceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37October 2010Networking[PDF]

Shark: Fast Data Analysis Using Coarse-grained Distributed MemoryC. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. StoicaDemo, ACM SIGMOD/PODS Conference, Scottsdale, ArizonaMay 2012Networking[PDF]

NetComplex: A Complexity Metric for Network System DesignsB.-G. Chun, S. Ratnasamy, and E. KohlerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406April 2008Networking
Attested Append-Only Memory: Making Adversaries Stick to their WordB.-G. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204October 2007Networking[PDF]

Pages