Nicholas Weaver

Orcid: 0000-0001-7004-5819

According to our database1, Nicholas Weaver authored at least 67 papers between 1998 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Escalating complexity and fragmentation of mental health service systems: the role of recovery as a form of moral communication.
Kybernetes, 2022

Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value.
CoRR, 2022

2021
Cache Me Outside: A New Look at DNS Cache Probing.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

2018
Cybercasing 2.0: You Get What You Pay For.
CoRR, 2018

Risks of cryptocurrencies.
Commun. ACM, 2018

The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

2017
Global-Scale Measurement of DNS Manipulation.
login Usenix Mag., 2017

Global Measurement of DNS Manipulation.
Proceedings of the 26th USENIX Security Symposium, 2017

Autosonda: Discovering Rules and Triggers of Censorship Devices.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

2016
Detecting DNS Root Manipulation.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Stressing Out: Bitcoin "Stress Testing".
Proceedings of the Financial Cryptography and Data Security, 2016

Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
The Case for a General and Interaction-based Third-party Cookie Policy.
CoRR, 2015

Cookies Lack Integrity: Real-World Implications.
Proceedings of the 24th USENIX Security Symposium, 2015

Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Ethical Concerns for Censorship Measurement.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015

Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
Here Be Web Proxies.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Botcoin: Monetizing Stolen Cycles.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

The Matter of Heartbleed.
Proceedings of the 2014 Internet Measurement Conference, 2014

A Tangled Mass: The Android Root Certificate Stores.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

2013
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Internet nameserver IPv4 and IPv6 address relationships.
Proceedings of the 2013 Internet Measurement Conference, 2013

2012
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

The BIZ Top-Level Domain: Ten Years Later.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

Fathom: a browser-based network measurement platform.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

2011
BufferBloat: What's Wrong with the Internet?
ACM Queue, 2011

Redirecting DNS for Ads and Profit.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011

Show Me the Money: Characterizing Spam-advertised Revenue.
Proceedings of the 20th USENIX Security Symposium, 2011

Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Experiences from Netalyzr with engaging users in end-system measurement.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

Sherlock holmes' evil twin: on the impact of global inference for online privacy.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

GQ: practical containment for measuring modern malware systems.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2010
Botnet Judo: Fighting Spam with Itself.
Proceedings of the Network and Distributed System Security Symposium, 2010

Netalyzr: illuminating the edge network.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
An architecture for exploiting multi-core processors to parallelize network intrusion prevention.
Concurr. Comput. Pract. Exp., 2009

Think Evil (tm).
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Detecting Forged TCP Reset Packets.
Proceedings of the Network and Distributed System Security Symposium, 2009

Emµcode: Masking hard faults in complex functional units.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Securing web content.
Proceedings of the 2009 workshop on Re-architecting the internet, ReArch@CoNEXT 2009, 2009

2008
Principles for Developing Comprehensive Network Visibility.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

2007
Very Fast Containment of Scanning Worms, Revisited.
Proceedings of the Malware Detection, 2007

Stress Testing Cluster Bro.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

The shunt: an FPGA-based accelerator for network intrusion prevention.
Proceedings of the ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays, 2007

Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
White Worms Don't Work.
login Usenix Mag., 2006

Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Protocol-Independent Adaptive Replay of Application Dialog.
Proceedings of the Network and Distributed System Security Symposium, 2006

2005
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Reflections on Witty.
login Usenix Mag., 2004

The Kadison-Singer problem in discrepancy theory.
Discret. Math., 2004

Preliminary results using scale-down to explore worm dynamics.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

The top speed of flash worms.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Worms vs. perimeters: the case for hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects, 2004

The SFRA: a corner-turn FPGA architecture.
Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, 2004

2003
Inside the Slammer Worm.
IEEE Secur. Priv., 2003

A taxonomy of computer worms.
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003

Post-placement C-slow retiming for the xilinx virtex FPGA.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003

2002
How to Own the Internet in Your Spare Time.
Proceedings of the 11th USENIX Security Symposium, 2002

The Effects of Datapath Placement and C-Slow Retiming on Three Computational Benchmarks.
Proceedings of the 10th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2002), 2002

2000
A Comparison of the AES Candidates Amenability to FPGA Implementation.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1998
Object Oriented Circuit-Generators in Java.
Proceedings of the 6th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM '98), 1998


  Loading...