Publication Search Results

TitleAuthorBibliographicDatesort descendingGroupLinks
Click Trajectories: End-to-End Analysis of the Spam Value ChainK. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. SavageProceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, CaliforniaMay 2011Networking[PDF]

Design and Evaluation of a Real-Time URL Spam Filtering ServiceK. Thomas, C. Grier, J. Ma, V. Paxson, and D. SongProceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464May 2011Networking[PDF]

Disk-Locality in Datacenter Computing Considered IrrelevantG. Anantharayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, CaliforniaMay 2011Networking[PDF]

Computing TCP's Retransmission TimerV. Paxson, M. Allman, J. Chu, and M. SargentRFC 6298June 2011Networking[PDF]

Jellyfish: Networking Data Centers RandomlyA. Singla, C.-Y. Hong, L. Popa, and P. Brighten GodfreyProceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, OregonJune 2011Networking[PDF]

Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter NetworksH. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. GuedesProceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, OregonJune 2011Networking[PDF]

Computing Security in the Developing World: A Case for Multidisciplinary ResearchY. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. BrewerProceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C.June 2011Networking[PDF]

The Datacenter Needs an Operating SystemM. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. StoicaProceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, OregonJune 2011Networking[PDF]

An Assessment of Overt Malicious Activity Manifest in Residential NetworksG. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. VallentinProceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163July 2011Networking[PDF]

What's Clicking What? Techniques and Innovations of Today's ClickbotsB. Miller, P. Pearce, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183July 2011Networking[PDF]

Editorial: Architecting for InnovationT. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. KuptsovACM SIGCOMM Computer Communications Review, Vol. 41, No. 3July 2011Networking[PDF]

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, CaliforniaJuly 2011Networking[PDF]

Networking in the Long EmergencyB. Raghavan and J. MaProceedings of the ACM SIGCOMM Workshop on Green Networking (GreenNet '11), Ontario, Canada, pp. 37-42August 2011Networking[PDF]

Measuring Pay-per-Install: The Commoditization of Malware DistributionJ. Cabellero, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Show Me the Money: Characterizing Spam-Advertised RevenueC. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. SavageProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

On Preserving Privacy in Information-Centric NetworksS. Arianfar, T. Koponen, B. Raghavan, and S. ShenkerProceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24August 2011Networking[PDF]

Reflections on Measurement Research: Crooked Lines, Straight Lines, and MoneyshotsV. PaxsonKeynote talk at the ACM Special Interest Group on Data Communications Conference (SIGCOMM 2011), Toronto, CanadaAugust 2011Networking
Experiences from Netalyzr with Engaging Users in End-System MeasurementC. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. PaxsonProceedings of ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), pp. 25-30, Toronto, Canada.August 2011Networking[PDF]

Redirecting DNS for Ads and ProfitN. Weaver, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium's Workshop on Free and Open Communications on the Internet (FOCI '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

FrameNet as a Resource for Paraphrase ResearchY. Hasegawa, R. Lee-Goldman, A. Kong, and K. AkitaConstructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127August 2011Networking
Mesos: Flexible Resource Sharing for the CloudB. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A.D. Joseph, R. Katz, S. Shenker and I. StoicaUSENIX ;login:, Vol. 36, No. 4, pp. 37-45August 2011Networking[PDF]

Naming in Content-Oriented ArchitecturesA. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. ShenkerProceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), Toronto, ON, CanadaAugust 2011Networking[PDF]

Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online PrivacyG. Friedland, G. Maier, R. Sommer, and N. WeaverProceedings of the New Security Paradigms Workshop (NSPW), Marin County, CaliforniaSeptember 2011Networking[PDF]

Spam Detection Using Web Page Content: A New BattlegroundM. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. HoepersProceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia.September 2011Networking[PDF]

Information-Centric Networking: Seeing the Forest for the TreesA. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. WilcoxProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Intelligent Design Enables Architectural EvolutionA. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. WilcoxProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

The Energy and Emergy of the InternetB. Raghavan and J. MaProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Data-Driven Network ConnectivityJ. Liu, S. Shenker, M. Schapira, and B. YangProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Suspended Accounts in Retrospect: An Analysis of Twitter SpamK. Thomas, C. Grier, V. Paxson, and D. SongProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, GermanyNovember 2011Networking[PDF]

GQ: Practical Containment for Measuring Modern Malware SystemsC. Kreibich, N. Weaver, C. Kanich, W. Cui, V. PaxsonProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002.November 2011Networking
TCP Fast OpenS. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and B. RaghavanProceedings of the 7th International Conference on emerging Network EXperiments and Technologies (ACM CoNEXT 2011), Tokyo, JapanDecember 2011Networking[PDF]

Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research CommunityM. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. SongEECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, CaliforniaJanuary 2012Networking[PDF]

The BIZ Top-Level Domain: Ten Years LaterT. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. PaxsonProceedings of the 13th Passive and Active Measurement Conference, Vienna, AustriaMarch 2012Networking[PDF]

Probe and Pray: Using UPnP for Home Network MeasurementsL. DiCioccio, R. Teixeira, M. May, and C. KreibichProceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, AustriaMarch 2012Networking[PDF]

Hold-On: Protecting Against On-Path DNS PoisoningH. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. PaxsonProceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United KingdomMarch 2012Networking[PDF]

On Building Inexpensive Network CapabilitiesC. Shue, A. Kalafut, M. Allman, and C. TaylorACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79April 2012Networking[PDF]

Carat: Collaborative Energy Bug DetectionA. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. TarkomaPoster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, CaliforniaApril 2012Networking
Adapting Social Spam Infrastructure for Political CensorshipK. Thomas, C. Grier, and V. PaxsonProceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, CaliforniaApril 2012Networking[PDF]

On Controller Performance in Software-Defined NetworksA. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. SherwoodProceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, CaliforniaApril 2012Networking[PDF]

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CAApril 2012Networking[PDF]

PACMan: Coordinated Memory Caching for Parallel JobsG. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, CaliforniaApril 2012Networking[PDF]

An Intermittent Energy Internet ArchitectureB. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. StreedProceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, SpainMay 2012Networking[PDF]

Prudent Practices for Designing Malware Experiments: Status Quo and OutlookC. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van SteenProceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79May 2012Networking[PDF]

Shark: Fast Data Analysis Using Coarse-grained Distributed MemoryC. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. StoicaDemo, ACM SIGMOD/PODS Conference, Scottsdale, ArizonaMay 2012Networking[PDF]

Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large ClustersM. Zaharia, T. Das, H. Li, S. Shenker and I. StoicaIn the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MAJune 2012Networking[PDF]

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted SystemsL. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. StoicaProceedings of the USENIX Annual Technical Conference (ATC), Boston, MAJune 2012Networking[PDF]

Why Let Resources Idle? Aggressive Cloning of Jobs with DollyG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, MassachusettsJune 2012Networking[PDF]

Software-Defined Networking: History, Hype, and HopeS. ShenkerProceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012.July 2012Networking
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsD. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. LevchenkoProceedings of the 21st USENIX Security Symposium, Bellevue, WashingtonAugust 2012Networking[PDF]

Logically Centralized? State Distribution Tradeoffs in Software Defined NetworksD. Levin, A. Wundsam, B. Heller, N. Handigol, and A. FeldmannProceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, FinlandAugust 2012Networking[PDF]

Pages