Publication Search Results

TitleAuthorBibliographicsort descendingDateGroupLinks
Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Detecting Forged TCP Reset PacketsN. Weaver, R. Sommer, and V. PaxsonProceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, CaliforniaFebruary 2009Networking[PDF]

Search and Replication in Unstructured Peer-to-Peer NetworksQ. Lv, P. Cao, E. Cohen, K. Li, and S. ShenkerProceedings of the 16th International Conference on Supercomputing (ICS-02), New York, New York, pp. 84-95June 2002Networking[PDF]

@spam: The Underground on 140 Characters or LessC. Grier, K. Thomas, V. Paxson, and M. ZhangProceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37October 2010Networking[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

Efficient Application Placement in a Dynamic Hosting PlatformZ. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. LiberatoreProceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290April 2009Networking[PDF]

Glish: A Software Bus for High-Level ControlV. PaxsonProceedings of the 1993 International Conference on Accelerator and Large Experimental Physics Control Systems, Berlin, GermanyOctober 1993Networking
Glish: A User-Level Software Bus for Loosely-Coupled Distributed SystemsV. Paxson and C. SaltmarshProceedings of the 1993 Winter USENIX Technical Conference, San Diego, CaliforniaJanuary 1993Networking
Manufacturing Compromise: The Emergence of Exploit-as-a-ServiceC. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. VoelkerProceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North CarolinaOctober 2012Networking[PDF]

Priceless: The Role of Payments in Abuse-Advertised GoodsD. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. SavageProceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North CarolinaOctober 2012Networking
Characteristics of Internet Background RadiationR. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. PetersonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Strategies for Sound Internet MeasurementV. PaxsonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a PathS. Katti, D. Katabi, C. Blake, E. Kohler, and J. StraussProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250October 2004Networking[PDF]

Measuring Interactions Between Transport Protocols and MiddleboxesA. Medina, M. Allman, and S. FloydProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 336-341October 2004Networking[PDF]

A First Look at Modern Enterprise TrafficR. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. TierneyProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28October 2005Networking[PDF]

Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale EventA. Kumar, V. Paxson, and N. WeaverProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 351-364October 2005Networking[PDF]

Replay Debugging for Distributed ApplicationsD. Geels, G. Altekar, S. Shenker, and I. StoicaProceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300May 2006Networking[PDF]

On Calibrating Enterprise Switch MeasurementsB. Nechaev, V. Paxson, M. Allman, and A. GurtovProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155November 2009Networking[PDF]

On Dominant Characteristics of Residential Broadband Internet TrafficG. Maier, A. Feldmann, V. Paxson, and M. AllmanProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102November 2009Networking[PDF]

A Preliminary Analysis of TCP Performance in an Enterprise NetworkB. Nechaev, M. Allman, V. Paxson, and A. GurtovProceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, CaliforniaApril 2010Networking[PDF]

Suspended Accounts in Retrospect: An Analysis of Twitter SpamK. Thomas, C. Grier, V. Paxson, and D. SongProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, GermanyNovember 2011Networking[PDF]

GQ: Practical Containment for Measuring Modern Malware SystemsC. Kreibich, N. Weaver, C. Kanich, W. Cui, V. PaxsonProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002.November 2011Networking
Fathom: A Browser-based Network Measurement PlatformM. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. PaxsonProceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, MassachusettsNovember 2012Networking[PDF]

Measuring Pay-per-Install: The Commoditization of Malware DistributionJ. Cabellero, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Show Me the Money: Characterizing Spam-Advertised RevenueC. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. SavageProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Redirecting DNS for Ads and ProfitN. Weaver, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium's Workshop on Free and Open Communications on the Internet (FOCI '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Attested Append-Only Memory: Making Adversaries Stick to their WordB.-G. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204October 2007Networking[PDF]

A BGP-Based Mechanism for Lowest-Cost RoutingJ. Feigenbaum, C.H. Papadimitriou, R. Sami, and S. ShenkerProceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), Monterey, California, pp. 173-182.July 2002Networking[PDF]

Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71December 2005Networking[PDF]

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsD. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. LevchenkoProceedings of the 21st USENIX Security Symposium, Bellevue, WashingtonAugust 2012Networking[PDF]

A Tool for Debugging Internet Multicast RoutingD. Agarwal and S. FloydProceedings of the 22nd Annual ACM Computer Science Conference (CSC '94), Phoenix, ArizonaMarch 1994Networking
Brief Announcement: Prefix Hash TreeS. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367July 2004Networking[PDF]

Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20July 2004Networking[PDF]

Reliable Broadcast in Unknown Fixed-Identity NetworksL. Subramanian, R. Katz, V. Roth, S. Shenker, and I. StoicaProceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), Las Vegas, California, pp. 342-351July 2005Networking[PDF]

Open Source vs. Closed Source Software: Towards Measuring SecurityG. Schryen and R. KaduraProceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023March 2009Networking[PDF]

The "Dresden Image Database" for Benchmarking Digital Image ForensicsT. Gloe and R. BoehmeProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, SwitzerlandMarch 2010Networking
SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer NetworksS. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. YangProceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12April 2006Networking[PDF]

Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway DiscoveryP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, FloridaNovember 2004Networking[PDF]

Querying the Internet with PIERR. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. StoicaProceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, GermanySeptember 2003Networking[PDF]

Spark: Cluster Computing with Working SetsM. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. StoicaProceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, MassachusettsJune 2010Networking[PDF]

Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System BehaviorV. Satopaa, J. Albrecht, D. Irwin, and B. RaghavanProceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, ItalyJune 2010Networking[PDF]

Enhancing P2P File-Sharing with an Internet-Scale Query ProcessorB. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. StoicaProceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443August 2004Networking[PDF]

Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerProceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227May 2000Networking
Design and Evaluation of a Real-Time URL Spam Filtering ServiceK. Thomas, C. Grier, J. Ma, V. Paxson, and D. SongProceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464May 2011Networking[PDF]

Prudent Practices for Designing Malware Experiments: Status Quo and OutlookC. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van SteenProceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79May 2012Networking[PDF]

An ATM Distributed Simulator for Network Management ResearchJ. L. Marzo, P. Vilà, L. Fàbrega, and D. MassaguerProceedings of the 34th Annual Simulation Symposium (SS 2001), Seattle, Washington, pp. 185-192April 2001Networking
A Stochastic Process on the Hypercube with Applications to Peer-to-peer NetworksM. Adler, E. Halperin, R. M. Karp, and V VaziraniProceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584June 2003Networking[PDF]

Peer to Peer Edge Caches Should Be FreeN. WeaverProceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, VirginiaSeptember 2009Networking[PDF]

Optimization Problems in Congestion ControlR.M. Karp, E. Koutsoupias, C.H. Papadimitriou, and S. ShenkerProceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), Redondo Beach, California, pp. 66-74November 2000Networking[PDF]

Pages