| Minuet: Rethinking Concurrency Control in Storage Area Networks | A. Ermolinskiy, D. Moon, B. Chun, and S. Shenker | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California | February 2009 | Networking | [PDF]
|
| Detecting Forged TCP Reset Packets | N. Weaver, R. Sommer, and V. Paxson | Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, California | February 2009 | Networking | [PDF]
|
| Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia | G. Schryen | Proceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50 | December 2008 | Networking | [PDF]
|
| Spamalytics: An Empirical Analysis of Spam Marketing Conversion | C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009 | October 2008 | Networking | [PDF]
|
| Revocation Games in Ephemeral Networks | M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210 | October 2008 | Networking | [PDF]
|
| Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding | A. Ermolinskiy and S. Shenker | Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 91-96 | October 2008 | Networking | [PDF]
|
| Pathlet Routing | P. B. Godfrey, S. Shenker, and I. Stoica | Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 97-102 | October 2008 | Networking | [PDF]
|
| Rethinking Packet Forwarding Hardware | D. Moon, M. Casado, T. Koponen, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 1-6 | October 2008 | Networking | [PDF]
|
| Predicting the Resource Consumption of Network Intrusion Detection Systems | H. Dreger, A. Feldmann, V. Paxson, and R. Sommer | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154 | September 2008 | Networking | [PDF]
|
| Enriching Network Security Analysis with Time Travel | G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. Schneider | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194 | August 2008 | Networking | [PDF]
|
| TCP Slow Start Survey: Standards and Issues | M. Allman | IETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progress | August 2008 | Networking | [PDF]
|
| Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination | A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), San Diego, California, pp. 219-230 | August 2008 | Networking | [PDF]
|
| Accountable Internet Protocol (AIP) | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350 | August 2008 | Networking | [PDF]
|
| Can Software Routers Scale? | K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. Ratnasamy | Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, Washington | August 2008 | Networking | [PDF]
|
| RFC 5290: Comments on the Usefulness of Simple Best-Effort Traffic | S. Floyd and M. Allman | Request for Comments 5290, Informational | July 2008 | Networking | [PDF]
|
| IMRG Workshop on Application Classification and Identification Report | T. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. Moore | ACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90 | July 2008 | Networking | |
| Principles for Developing Comprehensive Network Visibility | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, California | July 2008 | Networking | [PDF]
|
| A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems | L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson | Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278 | July 2008 | Networking | [PDF]
|
| NOX: Towards an Operating System for Networks | N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker | ACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110 | July 2008 | Networking | [PDF]
|
| Diverse Replication for Single-Machine Byzantine-Fault Tolerance | B.-C. Chun, P. Maniatis, and S. Shenker | Proceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292 | June 2008 | Networking | [PDF]
|
| Efficient and Robust TCP Stream Normalization | M. Vutukuru, H. Balakrishnan, and V. Paxson | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110 | May 2008 | Networking | [PDF]
|
| NetComplex: A Complexity Metric for Network System Designs | B.-G. Chun, S. Ratnasamy, and E. Kohler | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406 | April 2008 | Networking | |
| A Reactive Measurement Framework | M. Allman and V. Paxson | Proceedings of the 9th International Conference on Passive and Active Network Measurement (PAM 2008), Cleveland, Ohio, pp. 92-101 | April 2008 | Networking | [PDF]
|
| On Community-Oriented Internet Measurement | M. Allman, L. Martin, M. Rabinovich, and K. Atchinson | Proceedings of the Passive and Active Measurement Conference (PAM 2008), Cleveland, Ohio, pp. 112-121 | April 2008 | Networking | [PDF]
|
| What Ought a Program Committee to Do? | M. Allman | Proceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, California | April 2008 | Networking | [PDF]
|
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| On the Spam Campaign Trail | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, California | April 2008 | Networking | [PDF]
|
| OpenFlow: Enabling Innovation in Campus Networks | N. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. Balakris | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74 | April 2008 | Networking | [PDF]
|
| Detecting In-Flight Page Changes with Web Tripwires | C. Reis, S. Gribble, T. Kohno, and N. Weaver | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44 | April 2008 | Networking | [PDF]
|
| Reducing Network Energy Consumption via Sleeping and Rate-Adaptation | S. Nedevschi, L. Popa, G. Iannaccone, S. Raynasamy, and D. Wetherall | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California, pp. 323-336 | April 2008 | Networking | [PDF]
|
| Beyond Pilots: Keeping Rural Wireless Networks Alive | S. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. Brewer | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California | April 2008 | Networking | [PDF]
|
| RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms | S. Floyd | RFC 5166, Information, March 2008 | March 2008 | Networking | [PDF]
|
| Towards a Common TCP Evaluation Suite | L. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. Rhee | Proceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United Kingdom | March 2008 | Networking | [PDF]
|
| Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems | M. Allman, K. Christensen, B. Nordman, and V. Paxson | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Personal Namespaces | M. Allman | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Holding the Internet Accountable | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| Loss and Delay Accountability for the Internet | K. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. Shenker | Proceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205 | October 2007 | Networking | [PDF]
|
| Attested Append-Only Memory: Making Adversaries Stick to their Word | B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204 | October 2007 | Networking | [PDF]
|
| Issues and Etiquette Concerning Use of Shared Measurement Data | M. Allman and V. Paxson | Proceedings of ACM SIGCOMM Conference on Internet Measurement (IMC 2007), San Diego, California, pp. 135-140 | October 2007 | Networking | [PDF]
|
| A Brief History of Scanning | M. Allman, V. Paxson, and J. Terrell | Proceedings of ACM SIGCOMM Conference on Internet Measurement, San Diego, California, pp. 77-82 | October 2007 | Networking | [PDF]
|
| Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention | J. Gonzalez, V. Paxson, and N. Weaver | Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149 | October 2007 | Networking | [PDF]
|
| An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | J. Franklin, V. Paxson, A. Perrig, and S. Savage | Proceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388 | October 2007 | Networking | [PDF]
|
| The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware | M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, Australia | September 2007 | Networking | [PDF]
|
| Resolving Inter-Domain Policy Disputes | C. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168 | August 2007 | Networking | [PDF]
|
| Specifying New Congestion Control Algorithms | S. Floyd and M. Allman | Request For Comments 5033, Best Current Practice 133 | August 2007 | Networking | [PDF]
|
| Hidden-Action in Network Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | IEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172 | August 2007 | Networking | [PDF]
|
| Ethane: Taking Control of the Enterprise | M. Casado, M. Freedman, J. Pettit, N. McKeown, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 1-12 | August 2007 | Networking | [PDF]
|
| Achieving Convergence-Free Routing Using Failure-Carrying Packets | K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252 | August 2007 | Networking | [PDF]
|
| The Strengths of Weaker Identities: Opportunistic Personas | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts | August 2007 | Networking | [PDF]
|