Matthew Caesar

Orcid: 0000-0001-5955-9229

Affiliations:
  • University of Illinois at Urbana-Champaign, USA


According to our database1, Matthew Caesar authored at least 106 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Scaling Data Plane Verification with Intent-based Slicing.
CoRR, 2024

2023
VANET authentication protocols: security analysis and a proposal.
J. Supercomput., 2023

Drone-Hosted Computation for Emergency Response.
IEEE Internet Things J., 2023

Demo: Structural Network Minimization: A Case of Reflective Networking.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms.
Proceedings of the IEEE Military Communications Conference, 2023

Challenges in Metaverse Research: An Internet of Things Perspective.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Structural Semantics Management: an Application of the Chase in Networking.
Proceedings of the 31st International Symposium on Modeling, 2023

TwinSync: A Digital Twin Synchronization Protocol for Bandwidth-Limited IoT Applications.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Digital Twinning for Microservice Architectures.
Proceedings of the IEEE International Conference on Communications, 2023

Towards efficient charging schemes for free-floating rental BEVs.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

Indirect Network Troubleshooting with The Chase.
Proceedings of the 7th Asia-Pacific Workshop on Networking, 2023

2022
Effective charging strategies for rental BEVs.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

UAV-VANET authentication for real-time highway surveillance.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Lightweight VANET authentication protocols.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

FORTIFY: Software Defined Data Plane Resilience.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2022

IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Internet of Battlefield Things.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

2021
Tracking Grow-Finish Pigs Across Large Pens Using Multiple Cameras.
CoRR, 2021

Vision-based Behavioral Recognition of Novelty Preference in Pigs.
CoRR, 2021

Great educators in computer networking: Bruce Davie.
Comput. Commun. Rev., 2021

Practical Automation for Management Planes of Service Provider Infrastructure.
Proceedings of the FlexNets '21: Proceedings of the 4th FlexNets Workshop on Flexible Networks Artificial Intelligence Supported Network Flexibility and Agility, 2021

How Effective are Identification Technologies in Autonomous Driving Vehicles?
Proceedings of the 4th International Conference on Advanced Communication Technologies and Networking, 2021

2020
Update on ACM SIGCOMM CCR reviewing process: towards a more open review process.
Comput. Commun. Rev., 2020

Plankton: Scalable network configuration verification through model checking.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

Deep Reinforcement Learning for UAV-Assisted Emergency Response.
Proceedings of the MobiQuitous '20: Computing, 2020

Towards Verified Self-Driving Infrastructure.
Proceedings of the HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, 2020

2019
P4AIG: Circuit-Level Verification of P4 Programs.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
High-coverage testing of softwarized networks.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

Automatically Correcting Networks with NEAt.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
SWEET: Serving the Web by Exploiting Email Tunnels.
IEEE/ACM Trans. Netw., 2017

NEAt: Network Error Auto-Correct.
Proceedings of the Symposium on SDN Research, 2017

Let me rephrase that: Transparent optimization in SDNs.
Proceedings of the Symposium on SDN Research, 2017

Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

An Anomaly Detection Fabric for Clouds Based on Collaborative VM Communities.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Predicting Network Futures with Plankton.
Proceedings of the First Asia-Pacific Workshop on Networking, 2017

2016
Salmon: Robust Proxy Distribution for Censorship Circumvention.
Proc. Priv. Enhancing Technol., 2016

GhostPost: Seamless Restoration of Censored Social Media Posts.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

Ravel: A Database-Defined Network.
Proceedings of the Symposium on SDN Research, 2016

Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Sneak-Peek: High speed covert channels in data center networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Stabilizing Route Selection in BGP.
IEEE/ACM Trans. Netw., 2015

Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
Proc. Priv. Enhancing Technol., 2015

Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting.
CoRR, 2015

Systematically Exploring the Behavior of Control Programs.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Network-Aware Scheduling for Data-Parallel Jobs: Plan When You Can.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Conjoining Emulation and Network Simulators on Linux Multiprocessors.
Proceedings of the 3rd ACM Conference on SIGSIM-Principles of Advanced Discrete Simulation, London, United Kingdom, June 10, 2015

Enforcing Customizable Consistency Properties in Software-Defined Networks.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

2014
Fingerprinting Smart Devices Through Embedded Acoustic Components.
CoRR, 2014

A brief overview of the NEBULA future internet architecture.
Comput. Commun. Rev., 2014

TimeKeeper: a lightweight virtual time system for linux.
Proceedings of the SIGSIM Principles of Advanced Discrete Simulation, 2014

Software-Defined Networks as Databases.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Software Defined Transport: Flexible and Deployable Flow Rate Control.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

The Tangled Web of Password Reuse.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Analyzing an adaptive reputation metric for anonymity systems.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Transparent, Live Migration of a Software-Defined Network.
Proceedings of the ACM Symposium on Cloud Computing, 2014

Re<sup>3</sup>: relay reliability reputation for anonymity systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Shortest Paths in Microseconds.
CoRR, 2013

DEFINED: Deterministic Execution for Interactive Control-Plane Debugging.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

VeriFlow: Verifying Network-Wide Invariants in Real Time.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013


2012
Practical Network-Wide Compression of IP Routing Tables.
IEEE Trans. Netw. Serv. Manag., 2012

SybilControl: Practical Sybil Defense with Computational Puzzles
CoRR, 2012

Veriflow: verifying network-wide invariants in real time.
Comput. Commun. Rev., 2012

Shortest paths in less than a millisecond.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Finishing flows quickly with preemptive scheduling.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Walk the line: consistent network updates with bandwidth guarantees.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

SMOG: A cloud platform for seamless wide area migration of online games.
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games, 2012

X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Live migration of an entire network (and its hosts).
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

2011
SEATTLE: A Scalable Ethernet Architecture for Large Enterprises.
ACM Trans. Comput. Syst., 2011

Towards Deployable DDoS Defense for Web Applications
CoRR, 2011

X-Vine: Secure and Pseudonymous Routing Using Social Networks
CoRR, 2011

Better by a HAIR: hardware-amenable Internet routing.
Comput. Networks, 2011

Towards Practical Avoidance of Information Leakage in Enterprise Networks.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Slick packets.
Proceedings of the SIGMETRICS 2011, 2011

Debugging the data plane with anteater.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Making DTNs robust against spoofing attacks with localized countermeasures.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

P3CA: Private Anomaly Detection Across ISP Networks.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Clockscalpel: Understanding Root Causes of Internet Clock Synchronization Inaccuracy.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

Scaling data-plane logging in large scale networks.
Proceedings of the MILCOM 2011, 2011

ASAP: a low-latency transport layer.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Cirripede: circumvention infrastructure using router redirection with plausible deniability.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Improving robustness of DNS to software vulnerabilities.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Towards understanding bugs in open source router software.
Comput. Commun. Rev., 2010

Dynamic route recomputation considered harmful.
Comput. Commun. Rev., 2010

BotGrep: Finding P2P Bots with Structured Graph Analysis.
Proceedings of the 19th USENIX Security Symposium, 2010

Efficient Gigabit Ethernet Switch Models for Large-Scale Simulation.
Proceedings of the 24th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2010

Guaranteeing BGP Stability with a Few Extra Paths.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
Collaborative, Privacy-Preserving Data Aggregation at Scale.
IACR Cryptol. ePrint Arch., 2009

Revisiting Route Caching: The World Should Be Flat.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

Toward Interactive Debugging for ISP Networks.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

A Practical Approach for Providing QoS in Multichannel Ad-Hoc Networks Using Spectrum Width Adaptation.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Virtually eliminating router bugs.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Floodless in seattle: a scalable ethernet architecture for large enterprises.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Building bug-tolerant routers with virtualization.
Proceedings of the ACM SIGCOMM 2008 Workshop on Programmable Routers for Extensible Services of Tomorrow, 2008

2007
Achieving convergence-free routing using failure-carrying packets.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

2006
Virtual ring routing: network routing inspired by DHTs.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

ROFL: routing on flat labels.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

2005
BGP routing policies in ISP networks.
IEEE Netw., 2005

HLP: a next generation inter-domain routing protocol.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

Design and Implementation of a Routing Control Platform.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

2002

2000
A comparative study of pricing strategies for IP telephony.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000


  Loading...