| Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering | J. Caballero, P. Poosankam, C. Kreibich, and D. Song | Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634 | November 2009 | Networking | [PDF]
|
| Detecting Forged TCP Reset Packets | N. Weaver, R. Sommer, and V. Paxson | Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, California | February 2009 | Networking | [PDF]
|
| Search and Replication in Unstructured Peer-to-Peer Networks | Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker | Proceedings of the 16th International Conference on Supercomputing (ICS-02), New York, New York, pp. 84-95 | June 2002 | Networking | [PDF]
|
| @spam: The Underground on 140 Characters or Less | C. Grier, K. Thomas, V. Paxson, and M. Zhang | Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37 | October 2010 | Networking | [PDF]
|
| Botnet Judo: Fighting Spam with Itself | A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. Savage | Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, California | February 2010 | Networking | [PDF]
|
| Efficient Application Placement in a Dynamic Hosting Platform | Z. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. Liberatore | Proceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290 | April 2009 | Networking | [PDF]
|
| Glish: A Software Bus for High-Level Control | V. Paxson | Proceedings of the 1993 International Conference on Accelerator and Large Experimental Physics Control Systems, Berlin, Germany | October 1993 | Networking | |
| Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems | V. Paxson and C. Saltmarsh | Proceedings of the 1993 Winter USENIX Technical Conference, San Diego, California | January 1993 | Networking | |
| Manufacturing Compromise: The Emergence of Exploit-as-a-Service | C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker | Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North Carolina | October 2012 | Networking | [PDF]
|
| Priceless: The Role of Payments in Abuse-Advertised Goods | D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage | Proceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North Carolina | October 2012 | Networking | |
| Characteristics of Internet Background Radiation | R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Strategies for Sound Internet Measurement | V. Paxson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a Path | S. Katti, D. Katabi, C. Blake, E. Kohler, and J. Strauss | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250 | October 2004 | Networking | [PDF]
|
| Measuring Interactions Between Transport Protocols and Middleboxes | A. Medina, M. Allman, and S. Floyd | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 336-341 | October 2004 | Networking | [PDF]
|
| A First Look at Modern Enterprise Traffic | R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney | Proceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28 | October 2005 | Networking | [PDF]
|
| Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event | A. Kumar, V. Paxson, and N. Weaver | Proceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 351-364 | October 2005 | Networking | [PDF]
|
| Replay Debugging for Distributed Applications | D. Geels, G. Altekar, S. Shenker, and I. Stoica | Proceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300 | May 2006 | Networking | [PDF]
|
| On Calibrating Enterprise Switch Measurements | B. Nechaev, V. Paxson, M. Allman, and A. Gurtov | Proceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155 | November 2009 | Networking | [PDF]
|
| On Dominant Characteristics of Residential Broadband Internet Traffic | G. Maier, A. Feldmann, V. Paxson, and M. Allman | Proceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102 | November 2009 | Networking | [PDF]
|
| A Preliminary Analysis of TCP Performance in an Enterprise Network | B. Nechaev, M. Allman, V. Paxson, and A. Gurtov | Proceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, California | April 2010 | Networking | [PDF]
|
| Suspended Accounts in Retrospect: An Analysis of Twitter Spam | K. Thomas, C. Grier, V. Paxson, and D. Song | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany | November 2011 | Networking | [PDF]
|
| GQ: Practical Containment for Measuring Modern Malware Systems | C. Kreibich, N. Weaver, C. Kanich, W. Cui, V. Paxson | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002. | November 2011 | Networking | |
| Fathom: A Browser-based Network Measurement Platform | M. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. Paxson | Proceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, Massachusetts | November 2012 | Networking | [PDF]
|
| Measuring Pay-per-Install: The Commoditization of Malware Distribution | J. Cabellero, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Show Me the Money: Characterizing Spam-Advertised Revenue | C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Redirecting DNS for Ads and Profit | N. Weaver, C. Kreibich, and V. Paxson | Proceedings of the 20th USENIX Security Symposium's Workshop on Free and Open Communications on the Internet (FOCI '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Attested Append-Only Memory: Making Adversaries Stick to their Word | B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204 | October 2007 | Networking | [PDF]
|
| A BGP-Based Mechanism for Lowest-Cost Routing | J. Feigenbaum, C.H. Papadimitriou, R. Sami, and S. Shenker | Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), Monterey, California, pp. 173-182. | July 2002 | Networking | [PDF]
|
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71 | December 2005 | Networking | [PDF]
|
| PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko | Proceedings of the 21st USENIX Security Symposium, Bellevue, Washington | August 2012 | Networking | [PDF]
|
| A Tool for Debugging Internet Multicast Routing | D. Agarwal and S. Floyd | Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94), Phoenix, Arizona | March 1994 | Networking | |
| Brief Announcement: Prefix Hash Tree | S. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367 | July 2004 | Networking | [PDF]
|
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20 | July 2004 | Networking | [PDF]
|
| Reliable Broadcast in Unknown Fixed-Identity Networks | L. Subramanian, R. Katz, V. Roth, S. Shenker, and I. Stoica | Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), Las Vegas, California, pp. 342-351 | July 2005 | Networking | [PDF]
|
| Open Source vs. Closed Source Software: Towards Measuring Security | G. Schryen and R. Kadura | Proceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023 | March 2009 | Networking | [PDF]
|
| The "Dresden Image Database" for Benchmarking Digital Image Forensics | T. Gloe and R. Boehme | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, Switzerland | March 2010 | Networking | |
| SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer Networks | S. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. Yang | Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12 | April 2006 | Networking | [PDF]
|
| Trained to Accept? A Field Experiment on Consent Dialogs | R. Boehme and S. Koepsell | Proceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406 | April 2010 | Networking | [PDF]
|
| Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway Discovery | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, Florida | November 2004 | Networking | [PDF]
|
| Querying the Internet with PIER | R. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. Stoica | Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, Germany | September 2003 | Networking | [PDF]
|
| Spark: Cluster Computing with Working Sets | M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. Stoica | Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts | June 2010 | Networking | [PDF]
|
| Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System Behavior | V. Satopaa, J. Albrecht, D. Irwin, and B. Raghavan | Proceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, Italy | June 2010 | Networking | [PDF]
|
| Enhancing P2P File-Sharing with an Internet-Scale Query Processor | B. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. Stoica | Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443 | August 2004 | Networking | [PDF]
|
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227 | May 2000 | Networking | |
| Design and Evaluation of a Real-Time URL Spam Filtering Service | K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song | Proceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464 | May 2011 | Networking | [PDF]
|
| Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen | Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79 | May 2012 | Networking | [PDF]
|
| An ATM Distributed Simulator for Network Management Research | J. L. Marzo, P. Vilà, L. Fàbrega, and D. Massaguer | Proceedings of the 34th Annual Simulation Symposium (SS 2001), Seattle, Washington, pp. 185-192 | April 2001 | Networking | |
| A Stochastic Process on the Hypercube with Applications to Peer-to-peer Networks | M. Adler, E. Halperin, R. M. Karp, and V Vazirani | Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584 | June 2003 | Networking | [PDF]
|
| Peer to Peer Edge Caches Should Be Free | N. Weaver | Proceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, Virginia | September 2009 | Networking | [PDF]
|
| Optimization Problems in Congestion Control | R.M. Karp, E. Koutsoupias, C.H. Papadimitriou, and S. Shenker | Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), Redondo Beach, California, pp. 66-74 | November 2000 | Networking | [PDF]
|