Geoffrey M. Voelker

Orcid: 0000-0003-0865-7499

Affiliations:
  • University of California, San Diego, USA


According to our database1, Geoffrey M. Voelker authored at least 164 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Awards

ACM Fellow

ACM Fellow 2017, "For contributions to empirical measurement and analysis in systems, networking and security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps.
Proc. Priv. Enhancing Technol., January, 2023

Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild.
CoRR, 2023

In the Line of Fire: Risks of DPI-triggered Data Collection.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

An Empirical Analysis of Enterprise-Wide Mandatory Password Updates.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild.
CoRR, 2022

Measuring security practices.
Commun. ACM, 2022

Domain Name Lifetimes: Baseline and Threats.
Proceedings of the 6th Network Traffic Measurement and Analysis Conference, 2022

Measuring UID smuggling in the wild.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Where .ru?: assessing the impact of conflict on russian domain infrastructure.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Retroactive identification of targeted DNS infrastructure hijacking.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

FaaSnap: FaaS made fast using snapshot-based VMs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

The Challenges of Blockchain-Based Naming Systems for Malware Defenders.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

2021
Hopper: Modeling and Detecting Lateral Movement (Extended Report).
CoRR, 2021

Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium, 2021

Characterization of Anycast Adoption in the DNS Authoritative Infrastructure.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

Clairvoyance: Inferring Blocklist Use on the Internet.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Home is where the hijacking is: understanding DNS interception by residential routers.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Who's got your mail?: characterizing mail service provider usage.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Risky BIZness: risks derived from registrar name management.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
Technical perspective: Fake 'likes' and targeting collusion networks.
Commun. ACM, 2020

Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Particle: ephemeral endpoints for serverless networking.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

2019
Introduction to the Special Section on OSDI'18.
ACM Trans. Storage, 2019

Hack for Hire: Exploring the Emerging Market for Account Hijacking.
Proceedings of the World Wide Web Conference, 2019

Reading the Tea leaves: A Comparative Analysis of Threat Intelligence.
Proceedings of the 28th USENIX Security Symposium, 2019

Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of the 28th USENIX Security Symposium, 2019

Measuring Security Practices and How They Impact Security.
Proceedings of the Internet Measurement Conference, 2019

Web feature deprecation: a case study for chrome.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

2018
An Empirical Analysis of the Commercial VPN Ecosystem.
Proceedings of the Internet Measurement Conference 2018, 2018

Following Their Footsteps: Characterizing Account Automation Abuse and Defenses.
Proceedings of the Internet Measurement Conference 2018, 2018

CacheCloud: Towards Speed-of-light Datacenter Communication.
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018

Sprocket: A Serverless Video Processing Framework.
Proceedings of the ACM Symposium on Cloud Computing, 2018

Dark packets and the end of network scaling.
Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, 2018

2017
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

Tripwire: inferring internet site compromise.
Proceedings of the 2017 Internet Measurement Conference, 2017

Exploring the dynamics of search advertiser fraud.
Proceedings of the 2017 Internet Measurement Conference, 2017

2015
Managing Contention with Medley.
IEEE Trans. Mob. Comput., 2015

Enfold: Downclocking OFDM in Wi-Fi.
GetMobile Mob. Comput. Commun., 2015

CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks.
Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, 2015

Who is .com?: Learning to Parse WHOIS Records.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

From .academy to .zone: An Analysis of the New TLD Land Rush.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Affiliate Crookies: Characterizing Affiliate Marketing Abuse.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Scheduling techniques for hybrid circuit/packet networks.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

2014
Topic Modeling of Hierarchical Corpora.
CoRR, 2014

XXXtortion?: inferring registration intent in the .XXX TLD.
Proceedings of the 23rd International World Wide Web Conference, 2014

Circuit Switching Under the Radar with REACToR.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

DSpin: Detecting Automatically Spun Content on the Web.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Enfold: downclocking OFDM in WiFi.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Knock it off: profiling the online storefronts of counterfeit merchandise.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns.
Proceedings of the 2014 Internet Measurement Conference, 2014

Characterizing Large-Scale Click Fraud in ZeroAccess.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.
login Usenix Mag., 2013

eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

SloMo: Downclocking WiFi Communication.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Juice: A Longitudinal Study of an SEO Botnet.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

A Variational Approximation for Topic Modeling of Hierarchical Corpora.
Proceedings of the 30th International Conference on Machine Learning, 2013

Bullet trains: a study of NIC burst behavior at microsecond timescales.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Weighted fair queuing with differential dropping.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Taster's choice: a comparative analysis of spam feeds.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

BlueSky: a cloud-backed file system for the enterprise.
Proceedings of the 10th USENIX conference on File and Storage Technologies, 2012

Limitations of scanned human copresence encounters for modelling proximity-borne malware.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

Chronos: predictable low latency for data center applications.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Priceless: the role of payments in abuse-advertised goods.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


2011
DieCast: Testing Distributed Systems with an Accurate Scale Model.
ACM Trans. Comput. Syst., 2011

Learning to detect malicious URLs.
ACM Trans. Intell. Syst. Technol., 2011

Sora: high-performance software radio using general-purpose multi-core processors.
Commun. ACM, 2011

Privacy-preserving network forensics.
Commun. ACM, 2011

Got traffic?: an evaluation of click traffic providers.
Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, 2011

Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.
Proceedings of the 20th USENIX Security Symposium, 2011

Show Me the Money: Characterizing Spam-advertised Revenue.
Proceedings of the 20th USENIX Security Symposium, 2011

No Plan Survives Contact: Experience with Cybercrime Measurement.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

DefenestraTor: Throwing Out Windows in Tor.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

On the Effects of Registrar-level Intervention.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

An analysis of underground forums.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Cloak and dagger: dynamics of web search cloaking.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Topic modeling of freelance job postings to monitor web service abuse.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Usage Patterns in an Urban WiFi Network.
IEEE/ACM Trans. Netw., 2010

Difference engine: harnessing memory redundancy in virtual machines.
Commun. ACM, 2010

Measuring Online Service Availability Using Twitter.
Proceedings of the 3rd Workshop on Online Social Networks, 2010

Neon: system support for derived data management.
Proceedings of the 6th International Conference on Virtual Execution Environments, 2010

Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Proceedings of the 19th USENIX Security Symposium, 2010

Second life: a social network of humans and bots.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010

Botnet Judo: Fighting Spam with Itself.
Proceedings of the Network and Distributed System Security Symposium, 2010

Beyond heuristics: learning to classify vulnerabilities and predict exploits.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

How to tell an airport from a home: techniques and applications.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

2009
URL Reputation.
Dataset, October, 2009

Cumulus: Filesystem Backup to the Cloud.
login Usenix Mag., 2009

Difference Engine.
login Usenix Mag., 2009

Spamalytics: an empirical analysis of spam marketing conversion.
Commun. ACM, 2009

MPIWiz: subgroup reproducible replay of mpi applications.
Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2009

Sora: High Performance Software Radio Using General Purpose Multi-core Processors.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

SAM: enabling practical spatial multiple access in wireless LAN.
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009

Spamcraft: An Inside Look At Spam Campaign Orchestration.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

Beyond blacklists: learning to detect malicious web sites from suspicious URLs.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Defending Mobile Phones from Proximity Malware.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Identifying suspicious URLs: an application of large-scale online learning.
Proceedings of the 26th Annual International Conference on Machine Learning, 2009

2008
Storm: When Researchers Collide.
login Usenix Mag., 2008

Dual Frame Motion Compensation With Uneven Quality Assignment.
IEEE Trans. Circuits Syst. Video Technol., 2008

Automatic request categorization in internet services.
SIGMETRICS Perform. Evaluation Rev., 2008

Xl: an efficient network routing algorithm.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Banal: Because Format Checking Is So Trite.
Proceedings of the Workshop on Organizing Workshops, 2008

On the Spam Campaign Trail.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

Towards Automatic Inference of Task Hierarchies in Complex Systems.
Proceedings of the Fourth Workshop on Hot Topics in System Dependability, 2008

2007
Report from the 2006 SIGCOMM nomination committee.
Comput. Commun. Rev., 2007

Spamscatter: Characterizing Internet Scam Hosting Infrastructure.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Automating cross-layer diagnosis of enterprise wireless networks.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Usher: An Extensible Framework for Managing Clusters of Virtual Machines.
Proceedings of the 21th Large Installation System Administration Conference, 2007

Slicing Spam with Occam's Razor.
Proceedings of the CEAS 2007, 2007

2006
Characterization of a Large Web Site Population with Implications for Content Delivery.
World Wide Web, 2006

Inferring Internet denial-of-service activity.
ACM Trans. Comput. Syst., 2006

Maximizing data locality in distributed systems.
J. Comput. Syst. Sci., 2006

Jigsaw: solving the puzzle of enterprise 802.11 analysis.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

To Infinity and Beyond: Time-Warped Network Emulation.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

On Object Maintenance in Peer-to-Peer Systems.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

Unexpected means of protocol inference.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Finding diversity in remote code injection exploits.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
Wireless Hotspots: Current Challenges and Future Directions.
Mob. Networks Appl., 2005

Self-stopping worms.
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005

Surviving Internet Catastrophes.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

Scalability, fidelity, and containment in the potemkin virtual honeyfarm.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

Error Concealment for Dual Frame Video Coding with Uneven Quality.
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005

2004
ShortCuts: Using Soft State to Improve DHT Routing.
Proceedings of the Web Content Caching and Distribution: 9th International Workshop, 2004

Towards Informed Web Content Delivery.
Proceedings of the Web Content Caching and Distribution: 9th International Workshop, 2004

Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

Network sensitivity to hot-potato disruptions.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Total Recall: System Support for Automated Availability Management.
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), 2004

2003
End-to-end differentiation of congestion and wireless losses.
IEEE/ACM Trans. Netw., 2003

Access and mobility of wireless PDA users.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Characterizing and measuring path diversity of internet topologies.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

Understanding Availability.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

Internet Quarantine: Requirements for Containing Self-Propagating Code.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

In search of path diversity in ISP networks.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

Replication Strategies for Highly Available Peer-to-Peer Storage.
Proceedings of the Future Directions in Distributed Computing, 2003

2002
PAWNs: Satisfying the need for ubiquitos secure connectivity and location services.
IEEE Wirel. Commun., 2002

Hot-spot congestion relief and service guarantees in public-area wireless networks.
Comput. Commun. Rev., 2002

Hot-Spot Congestion Relief in Public-Area Wireless Network.
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002

Symbiotic jobscheduling with priorities for a simultaneous multithreading processor.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2002

Characterizing user behavior and network performance in a public wireless LAN.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2002

2001
Inferring Internet Denial-of-Service Activity.
Proceedings of the 10th USENIX Security Symposium, 2001

Measurement and Analysis of a Streaming Media Workload.
Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems, 2001

On the Placement of Web Server Replicas.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

2000
Cooperative caching in local-area and wide-area networks.
PhD thesis, 2000

1999
Detour: informed Internet routing and transport.
IEEE Micro, 1999

Organization-Based Analysis of Web-Object Sharing and Caching.
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999

On the scale and performance of cooperative Web proxy caching.
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999

Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999

1998
Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems.
ACM SIGOPS Oper. Syst. Rev., 1998

Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System.
Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1998

1997
Managing Server Load in Global Memory Systems.
Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1997

1996
The Structure and Performance of Interpreters.
Proceedings of the ASPLOS-VII Proceedings, 1996

Reducing Network Latency Using Subpages in a Global Memory Environment.
Proceedings of the ASPLOS-VII Proceedings, 1996

1994
Latency Analysis of TCP on an ATM Network.
Proceedings of the USENIX Winter 1994 Technical Conference, 1994

Mobisaic: An Information System for a Mobile Wireless Computing Environment.
Proceedings of the Mobile Computing [Mobidata Workshop on Mobile and Wireless Information Systems, Rutgers University, NJ, USA, October 31, 1994


  Loading...