| Priceless: The Role of Payments in Abuse-Advertised Goods | D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage | Proceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North Carolina | October 2012 | Networking | |
| PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko | Proceedings of the 21st USENIX Security Symposium, Bellevue, Washington | August 2012 | Networking | [PDF]
|
| Congestion Control Without a Startup Phase | D. Liu, M. Allman, S. Jin, and L. Wang | Proceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, California | February 2007 | Networking | [PDF]
|
| Logically Centralized? State Distribution Tradeoffs in Software Defined Networks | D. Levin, A. Wundsam, B. Heller, N. Handigol, and A. Feldmann | Proceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Internet Congestion Control for High Bandwidth-Delay Product Environments | D. Katabi, M. Handley, and C. Rohrs | Proceedings of ACM SIGCOMM 2002. | 2002 | Networking | |
| OCALA: An Architecture for Supporting Legacy Applications Over Overlays | D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280 | May 2006 | Networking | [PDF]
|
| Replay Debugging for Distributed Applications | D. Geels, G. Altekar, S. Shenker, and I. Stoica | Proceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300 | May 2006 | Networking | [PDF]
|
| Network Visualization with the Nam, VINT Network Animator | D. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. Yu | IEEE Computer, 33(11), 63-68, November 2000. | November 2000 | Networking | |
| A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing | D. Estrin, M. Handley, A. Helmy, P. Huang, and D. Thaler | Proceedings of Infocom 1999. | 1999 | Networking | |
| Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay | D. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford | Proceedings of RAID, 2002. | 2002 | Networking | |
| Towards a Sensor Network Architecture: Lowering the Waistline | D. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. Zhao | Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24 | June 2005 | Networking | |
| The Design and Implementation of a Declarative Sensor Network System | D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, California | October 2006 | Networking | |
| Flexibility as an Instrument in DRM Systems | D. Bergemann, T. Eisenbach, J. Feigenbaum, and S. Shenker | Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005), Cambridge, Massachusetts | June 2005 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Presented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms | D. Bansal, H. Balakrishnan, S. Floyd, and S. Shenker | SIGCOMM 2001 | 2001 | Networking | |
| Accountable Internet Protocol (AIP) | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350 | August 2008 | Networking | [PDF]
|
| Holding the Internet Accountable | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web | D. Akhawe, B. Amann, M. Vallentin, and R. Sommer | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| A Tool for Debugging Internet Multicast Routing | D. Agarwal and S. Floyd | Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94), Phoenix, Arizona | March 1994 | Networking | |
| A Modular Network Layer for Sensornets | C.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. Stoica | Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262 | November 2006 | Networking | [PDF]
|
| Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar | C.M. Yago, P. M. Ruiz, and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Local error recovery in SRM: comparison of two approaches | C.G. Liu, D. Estrin, S. Shenker, and L. Zhang | Proceedings of IEEE/ACM Transactions on Networking, Vol. 6, pp. 686-699 | December 1998 | Networking | |
| Distributed Segment Tree: Support Range Query and Cover Query over DHT | C. Zheng, G. Shen, S. Li, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| Insights from the Inside: A View of Botnet Management from Infiltration | C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| Resolving Inter-Domain Policy Disputes | C. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168 | August 2007 | Networking | [PDF]
|
| Practical Data-Centric Storage | C. T. Ee, S. Ratnasamy, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338 | May 2006 | Networking | [PDF]
|
| On Building Inexpensive Network Capabilities | C. Shue, A. Kalafut, M. Allman, and C. Taylor | ACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79 | April 2012 | Networking | [PDF]
|
| Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen | Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79 | May 2012 | Networking | [PDF]
|
| Detecting In-Flight Page Changes with Web Tripwires | C. Reis, S. Gribble, T. Kohno, and N. Weaver | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44 | April 2008 | Networking | [PDF]
|
| The Internet Under Crisis Conditions: Learning From September 11 | C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. Briscoe | Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC | 2002 | Networking | [PDF]
|
| Report of the NSF Scalable Information Infrastructure Workshop | C. Partridge, et al. | | October 07 1998 | Networking | |
| A Swifter Start for TCP | C. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. Sterbenz | Technical Report No. 8339, BBN Technologies, March 2002 | March 2002 | Networking | |
| Using Strongly Typed Networking to Architect for Tussle | C. Muthukrishnan, V. Paxson, M. Allman, and A. Akella | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9 | October 2010 | Networking | [PDF]
|
| Detecting and Analyzing Automated Activity on Twitter | C. M. Zhang and V. Paxson | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Experiences from Netalyzr with Engaging Users in End-System Measurement | C. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. Paxson | Proceedings of ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), pp. 25-30, Toronto, Canada. | August 2011 | Networking | [PDF]
|
| GQ: Practical Containment for Measuring Modern Malware Systems | C. Kreibich, N. Weaver, C. Kanich, W. Cui, V. Paxson | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002. | November 2011 | Networking | |
| Netalyzr: Illuminating The Edge Network | C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson | Proceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259 | November 2010 | Networking | [PDF]
|
| On the Spam Campaign Trail | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, California | April 2008 | Networking | [PDF]
|
| Spamcraft: An Inside Look At Spam Campaign Orchestration | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, Massachusetts | April 2009 | Networking | [PDF]
|
| Policy-Controlled Event Management for Distributed Intrusion Detection | C. Kreibich and R. Sommer | Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391 | June 2005 | Networking | [PDF]
|
| Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany | C. Kreibich and M. Jahnke, eds. | Springer | 2010 | Networking | |
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| Show Me the Money: Characterizing Spam-Advertised Revenue | C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Spamalytics: An Empirical Analysis of Spam Marketing Conversion | C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009 | October 2008 | Networking | [PDF]
|
| Manufacturing Compromise: The Emergence of Exploit-as-a-Service | C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker | Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North Carolina | October 2012 | Networking | [PDF]
|
| @spam: The Underground on 140 Characters or Less | C. Grier, K. Thomas, V. Paxson, and M. Zhang | Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37 | October 2010 | Networking | [PDF]
|
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| NetComplex: A Complexity Metric for Network System Designs | B.-G. Chun, S. Ratnasamy, and E. Kohler | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406 | April 2008 | Networking | |
| Attested Append-Only Memory: Making Adversaries Stick to their Word | B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204 | October 2007 | Networking | [PDF]
|