Marc Liberatore

According to our database1, Marc Liberatore authored at least 21 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet.
IEEE Trans. Mob. Comput., 2019

2017
Forensic Identification of Anonymous Sources in OneSwarm.
IEEE Trans. Dependable Secur. Comput., 2017

Statistical Detection of Downloaders in Freenet.
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017

2015
Discovering specification violations in networked software systems.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

2014
Efficient Tagging of Remote Peers during Child Pornography Investigations.
IEEE Trans. Dependable Secur. Comput., 2014

Sybil-Resistant Mixing for Bitcoin.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

2013
Measurement and analysis of child pornography trafficking on P2P networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

2012
Effectiveness and detection of denial-of-service attacks in tor.
ACM Trans. Inf. Syst. Secur., 2012

2011
Empirical tests of anonymous voice over IP.
J. Netw. Comput. Appl., 2011

Effective Digital Forensics Research Is Investigator-Centric.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Forensic investigation of the OneSwarm anonymous filesharing system.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Forensic investigation of peer-to-peer file sharing networks.
Digit. Investig., 2010

Strengthening forensic investigations of child pornography on P2P networks.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
DEX: Digital evidence provenance supporting reproducibility and comparison.
Digit. Investig., 2009

Detecting Denial of Service Attacks in Tor.
Proceedings of the Financial Cryptography and Data Security, 2009

2007
Cheat-proof playout for centralized and peer-to-peer gaming.
IEEE/ACM Trans. Netw., 2007

2006
Maximizing transfer opportunities in bluetooth DTNs.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

Inferring the source of encrypted HTTP connections.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Privacy Vulnerabilities in Encrypted HTTP Streams.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005


  Loading...