Publications

Found 215 results
Author Title Type [ Year(Asc)]
Filters: Author is Vern Paxson  [Clear All Filters]
2016
Ikram M, Vallina-Rodriguez N, Seneviratne S, Kaafar MAli, Paxson V.  2016.  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Jones B, Feamster N, Paxson V, Weaver N, Allman M.  2016.  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Khattak S, Fifield D, Afroz S, Javed M, Sundaresan S, Paxson V, Murdoch SJ, McCoy D.  2016.  Do You See What I See? Differential Treatment of Anonymous Users Proceedings of the Network and Distributed System Security Symposium (NDSS).
Chen J, Jiang J, Zheng X, Duan H, Liang J, Li K, Wan T, Paxson V.  2016.  Forwarding-Loop Attacks in Content Delivery Networks. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Chen J, Weaver N, Jiang J, Wan T, Duan H, Paxson V.  2016.   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C, Weaver N, Paxson V.  2016.  A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Proceedings of ACM Internet Measurement Conference.
Hao S, Kantchelian A, Miller B, Paxson V, Feamster N.  2016.  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Sundaresan S, McCoy D, Afroz S, Paxson V.  2016.  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
Li F, Ho G, Kuan E, Niu Y, Ballard L, Thomas K, Bursztein E, Paxson V.  2016.  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Tschantz MC, Afroz S, Anonymous, Paxson V.  2016.  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Jain S, Javed M, Paxson V.  2016.  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Vallentin M, Paxson V, Sommer R.  2016.  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Li F, Durumeric Z, Czyz J, Karami M, Bailey M, McCoy D, Savage S, Paxson V.  2016.  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
2015
Thomas K, Bursztein E, Jagpal N, Rajab MAbu, Provos N, Pearce P, Ho G, McCoy D, Grier C, Paxson V et al..  2015.  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Marczak B, Weaver N, Dalek J, Ensafi R, Fifield D, McKune S, Rey A, Scott-Railton J, Deibert R, Paxson V.  2015.  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Vallina-Rodriguez N, Sundaresan S, Kreibich C, Weaver N, Paxson V.  2015.  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Fifield D, Lan C, Hynes R, Wegmann P, Paxson V.  2015.  Blocking-resistant communication through domain fronting. Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
Afroz S, Fifield D, Tschantz MC, Paxson V, Tygar J.D..  2015.  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).

Pages