Dave Levin

Orcid: 0000-0003-4957-5131

According to our database1, Dave Levin authored at least 76 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants.
CoRR, 2023

Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country.
Proceedings of the ACM Web Conference 2023, 2023

How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.
Proceedings of the 32nd USENIX Security Symposium, 2023

Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

IPv6 Hitlists at Scale: Be Careful What You Wish For.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Global, Passive Detection of Connection Tampering.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

A Global Measurement of Routing Loops on the Internet.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

How to Count Bots in Longitudinal Datasets of IP Addresses.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

No Root Store Left Behind.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

Provably Avoiding Geographic Regions for Tor's Onion Services.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies.
Proceedings of the 31st USENIX Security Symposium, 2022

Investigating Influencer VPN Ads on YouTube.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

A comparative analysis of certificate pinning in Android & iOS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
I Know What You Imported Last Summer: A study of security threats in thePython ecosystem.
CoRR, 2021

Weaponizing Middleboxes for TCP Reflected Amplification.
Proceedings of the 30th USENIX Security Symposium, 2021

Sound Methodology for Downloading Webpages.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Bento: safely bringing network function virtualization to Tor.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes.
Proceedings of the FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet, 2021

Measurement and Analysis of Automated Certificate Reissuance.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Under the Hood of the Ethereum Gossip Protocol.
Proceedings of the Financial Cryptography and Data Security, 2021

2020
Build It, Break It, Fix It: Contesting Secure Development.
ACM Trans. Priv. Secur., 2020

Automating the censorship arms race.
XRDS, 2020

Achieving Keyless CDNs with Conclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

A Deeper Look at Web Content Availability and Consistency over HTTP/S.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

Bento: Bringing Network Function Virtualization to Tor.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

API Connectivity: Real-World Uses and Implementation Experiences in using APIs and Third-party Apps for Data Exchange and Research.
Proceedings of the AMIA 2020, 2020

2019
When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Residential links under the weather.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

How to Find Correlated Internet Failures.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins.
Proceedings of the Internet Measurement Conference, 2019

You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Geneva: Evolving Censorship Evasion Strategies.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Analysis of SSL certificate reissues and revocations in the wake of heartbleed.
Commun. ACM, 2018

King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

Internet anycast: performance, problems, & potential.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

Analyzing Ethereum's Contract Topology.
Proceedings of the Internet Measurement Conference 2018, 2018

Is the Web Ready for OCSP Must-Staple?
Proceedings of the Internet Measurement Conference 2018, 2018

Session details: Session G3: Motion.
Proceedings of the 44th Graphics Interface Conference, Toronto, Canada, May 8-11, 2018., 2018

2017
An End-to-End View of DNSSEC Ecosystem Management.
login Usenix Mag., 2017

unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

DeTor: Provably Avoiding Geographic Regions in Tor.
Proceedings of the 26th USENIX Security Symposium, 2017

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.
Proceedings of the 26th USENIX Security Symposium, 2017

CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Understanding the role of registrars in DNSSEC deployment.
Proceedings of the 2017 Internet Measurement Conference, 2017

Stick a fork in it: Analyzing the Ethereum network partition.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017

2016
Measuring and Applying Invalid SSL Certificates: The Silent Majority.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Picocenter: supporting long-lived, mostly-idle applications in cloud environments.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

Build It, Break It, Fix It: Contesting Secure Development.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Programming slick network functions.
Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research, 2015

Alibi Routing.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

UAv6: Alias Resolution in IPv6 Using Unused Addresses.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

An End-to-End Measurement of Certificate Revocation in the Web's PKI.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Ting: Measuring and Exploiting Latencies Between All Tor Nodes.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
RevCast: Fast, Private Certificate Revocation over FM Radio.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A slick control plane for network middleboxes.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

D-mystifying the D-root address change.
Proceedings of the 2013 Internet Measurement Conference, 2013

2010
Review5 of algorithmic game theory: editors: Noam Nisan, Tim Roughgarden, Eva Tardos, Vijay V. Vazirani, publisher: Cambridge University Press ISBN: 978-0-521-87282-9.
SIGACT News, 2010

Don't love thy nearest neighbor.
Proceedings of the 9th international conference on Peer-to-peer systems, 2010

2009
Symbiotic Relationships in Internet Routing Overlays.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

TrInc: Small Trusted Hardware for Large Distributed Systems.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

Systems-compatible incentives.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

2008
Bittorrent is an auction: analyzing and improving bittorrent's incentives.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Motivating participation in internet routing overlays.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

On the Fidelity of 802.11 Packet Traces.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Capacity of Asynchronous Random-Access Scheduling in Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
Accountability as a Service.
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007

Backbone construction in selfish wireless networks.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

PeerWise Discovery and Negotiation of Faster Paths.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

2006
Fair File Swarming with FOX.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006


  Loading...