Nick Feamster

Affiliations:
  • University of Chicago, IL, USA
  • Princeton University, USA (former)


According to our database1, Nick Feamster authored at least 264 papers between 1999 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2016, "For data-driven studies of Internet security and Internet censorship".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation.
Proc. ACM Meas. Anal. Comput. Syst., 2024

CATO: End-to-End Optimization of ML-Based Traffic Analysis Pipelines.
CoRR, 2024

ServeFlow: A Fast-Slow Model Architecture for Network Traffic Analysis.
CoRR, 2024

2023
A Survey of Worldwide Censorship Techniques.
RFC, November, 2023

A Comparative Analysis of Ookla Speedtest and Measurement Labs Network Diagnostic Test (NDT7).
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

AMIR: Active Multimodal Interaction Recognition from Video and Network Traffic in Connected Environments.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

LEAF: Navigating Concept Drift in Cellular Networks.
PACMNET, 2023

VidPlat: A Tool for Fast Crowdsourcing of Quality-of-Experience Measurements.
CoRR, 2023

Measuring the Prevalence of WiFi Bottlenecks in Home Access Networks.
CoRR, 2023

Grace++: Loss-Resilient Real-Time Video Communication under High Network Latency.
CoRR, 2023

AC-DC: Adaptive Ensemble Classification for Network Traffic Identification.
CoRR, 2023

Augmented Reality's Potential for Identifying and Mitigating Home Privacy Leaks.
CoRR, 2023

Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country.
Proceedings of the ACM Web Conference 2023, 2023

User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Optimizing Real-Time Video Experience with Data Scalable Codec.
Proceedings of the 2023 Workshop on Emerging Multimedia Systems, 2023

Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Estimating WebRTC Video QoE Metrics Without Using Application Headers.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Generative, High-Fidelity Network Traces.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

Discovery Testbed: An Observational Instrument for Broadband Research.
Proceedings of the 19th IEEE International Conference on e-Science, 2023

Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Alexa, Who Am I Speaking To?: Understanding Users' Ability to Identify Third-Party Apps on Amazon Alexa.
ACM Trans. Internet Techn., 2022

An Efficient One-Class SVM for Novelty Detection in IoT.
Trans. Mach. Learn. Res., 2022

You, Me, and IoT: How Internet-connected Consumer Devices Affect Interpersonal Relationships.
ACM Trans. Internet Things, 2022

Software-Supported Audits of Decision-Making Systems: Testing Google and Facebook's Political Advertising Policies.
Proc. ACM Hum. Comput. Interact., 2022

Enabling Personalized Video Quality Optimization with VidHoc.
CoRR, 2022

GRACE: Loss-Resilient Real-Time Video Communication Using Data-Scalable Autoencoder.
CoRR, 2022

Coordinated Science Laboratory 70th Anniversary Symposium: The Future of Computing.
CoRR, 2022

Measuring the Availability and Response Times of Public Encrypted DNS Resolvers.
CoRR, 2022

Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings.
CoRR, 2022

Towards Reproducible Network Traffic Analysis.
CoRR, 2022

How and Why People Use Virtual Private Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

GPS-Based Geolocation of Consumer IP Addresses.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

Poster: Investigating QUIC's Potential Impact on Censorship Circumvention.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Traffic Refinery: Cost-Aware Data Representation for Machine Learning on Network Traffic.
Proc. ACM Meas. Anal. Comput. Syst., 2021

A First Look at the Consolidation of DNS and Web Hosting Providers.
CoRR, 2021

Understanding Model Drift in a Large Cellular Network.
CoRR, 2021

An Efficient One-Class SVM for Anomaly Detection in the Internet of Things.
CoRR, 2021

Characterizing Service Provider Response to the COVID-19 Pandemic in the United States.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Can Encrypted DNS Be Fast?
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Measuring the performance and network utilization of popular video conferencing applications.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Designing for Tussle in Encrypted DNS.
Proceedings of the HotNets '21: The 20th ACM Workshop on Hot Topics in Networks, 2021

New Directions in Automated Traffic Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Encryption without centralization: distributing DNS queries across recursive resolvers.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

2020
Elmo: Source Routed Multicast for Public Clouds.
IEEE/ACM Trans. Netw., 2020

IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Beyond Accuracy: Cost-Aware Data Representation Exploration for Network Traffic Model Performance.
CoRR, 2020

nPrint: A Standard Data Representation for Network Traffic Analysis.
CoRR, 2020

Measuring the Performance of Encrypted DNS Protocols from Broadband Access Networks.
CoRR, 2020

A Comparative Study of Network Traffic Representations for Novelty Detection.
CoRR, 2020

Classifying Network Vendors at Internet Scale.
CoRR, 2020

Supporting Early and Scalable Discovery of Disinformation Websites.
CoRR, 2020

Practicing Safe Browsing: Understanding How and Why University Students Use Virtual Private Networks.
CoRR, 2020

D-DNS: Towards Re-Decentralizing the DNS.
CoRR, 2020

Measuring internet speed: current challenges and future recommendations.
Commun. ACM, 2020

Comparing the Effects of DNS, DoT, and DoH on Web Performance.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Understanding the Performance Costs and Benefits of Privacy-focused Browser Extensions.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Identifying Disinformation Websites Using Infrastructure Features.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

A Public Option for the Core.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

2019
The Man in the Middlebox: Violations of End-to-End Encryption.
login Usenix Mag., 2019

Oblivious DNS: Practical Privacy for DNS Queries.
Proc. Priv. Enhancing Technol., 2019

Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping.
Proc. Priv. Enhancing Technol., 2019

Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Security and Privacy Analyses of Internet of Things Children's Toys.
IEEE Internet Things J., 2019

New Problems and Solutions in IoT Security and Privacy.
CoRR, 2019

Internet Speed Measurement: Current Challenges and Future Recommendations.
CoRR, 2019

Lightweight, General Inference of Streaming Video Quality from Encrypted Traffic.
CoRR, 2019

Selling a Single Item with Negative Externalities.
Proceedings of the World Wide Web Conference, 2019

SPINE: Surveillance Protection in the Network Elements.
Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet, 2019

Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA.
Proceedings of the 28th USENIX Security Symposium, 2019

Going against the (Appropriate) Flow: A Contextual Integrity Approach to Privacy Policy Analysis.
Proceedings of the Seventh AAAI Conference on Human Computation and Crowdsourcing, 2019

You, Me, and IoT: How Internet-Connected Home Devices Affect Interpersonal Relationships.
Proceedings of the Companion Publication of the 2019 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2019

On the potential of Google AMP to promote local content in developing regions.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019.
Proceedings of the Applied Networking Research Workshop, 2019

Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern web.
Proceedings of the Applied Networking Research Workshop, 2019

2018
User Perceptions of Smart Home IoT Privacy.
Proc. ACM Hum. Comput. Interact., 2018

Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Toward Continual Measurement of Global Network-Level Censorship.
IEEE Secur. Priv., 2018

Analyzing Privacy Policies Using Contextual Integrity Annotations.
CoRR, 2018

CensorSeeker: Generating a Large, Culture-Specific Blocklist for China.
CoRR, 2018

Oblivious DNS: Practical Privacy for DNS Queries.
CoRR, 2018

Security and Privacy Analyses of Internet of Things Toys.
CoRR, 2018

Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices.
CoRR, 2018

Elmo: Source-Routed Multicast for Cloud Services.
CoRR, 2018

User Perceptions of Privacy in Smart Homes.
CoRR, 2018

How Do Tor Users Interact With Onion Services?
Proceedings of the 27th USENIX Security Symposium, 2018

Automatically Generating a Large, Culture-Specific Blocklist for China.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Machine Learning DDoS Detection for Consumer Internet of Things Devices.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Sonata: query-driven streaming network telemetry.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

Web-based Attacks to Discover and Control Local IoT Devices.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

Nation-State Hegemony in Internet Routing.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Preserving Privacy at IXPs.
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018

Why (and How) Networks Should Run Themselves.
Proceedings of the Applied Networking Research Workshop, 2018

2017
Global-Scale Measurement of DNS Manipulation.
login Usenix Mag., 2017

OCDN: Oblivious Content Distribution Networks.
CoRR, 2017

Characterizing and Improving the Reliability of Broadband Internet Access.
CoRR, 2017

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic.
CoRR, 2017

Sonata: Query-Driven Network Telemetry.
CoRR, 2017

Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers.
CoRR, 2017

A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic.
CoRR, 2017

Workshop on Tracking Quality of Experience in the Internet: Summary and Outcomes.
Comput. Commun. Rev., 2017

Global Measurement of DNS Manipulation.
Proceedings of the 26th USENIX Security Symposium, 2017

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Augur: Internet-Wide Detection of Connectivity Disruptions.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Concise Encoding of Flow Attributes in SDN Switches.
Proceedings of the Symposium on SDN Research, 2017

SDX-Based Flexibility or Internet Correctness?: Pick Two!
Proceedings of the Symposium on SDN Research, 2017

The Effect of DNS on Tor's Anonymity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Cleartext Data Transmissions in Consumer IoT Medical Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Insight into Africa's country-level latencies.
Proceedings of the IEEE AFRICON 2017, Cape Town, South Africa, September 18-20, 2017, 2017

2016
Staggercast: Demand-Side Management for ISPs.
CoRR, 2016

Revealing Utilization at Internet Interconnection Points.
CoRR, 2016

Characterizing and Avoiding Routing Detours Through Surveillance States.
CoRR, 2016

Identifying and Characterizing Sybils in the Tor Network.
Proceedings of the 25th USENIX Security Symposium, 2016

Authorizing Network Control at Software Defined Internet Exchange Points.
Proceedings of the Symposium on SDN Research, 2016

PISCES: A Programmable, Protocol-Independent Software Switch.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

A First Look into Transnational Routing Detours.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Home Network or Access Link? Locating Last-Mile Downstream Throughput Bottlenecks.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

Detecting DNS Root Manipulation.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

An Industrial-Scale Software Defined Internet Exchange Point.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Network Monitoring as a Streaming Analytics Problem.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

A First Look at Mobile Internet Use in Township Communities in South Africa.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern Web.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
JONS: Special Issue on Management of Software-Defined Networks.
J. Netw. Syst. Manag., 2015

Monitoring Internet Censorship with UBICA.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

The case for an intermediate representation for programmable data planes.
Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research, 2015

Programming slick network functions.
Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research, 2015

ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Ethical Concerns for Censorship Measurement.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015

Alternative Trust Sources: Reducing DNSSEC Signature Verification Operations with TLS.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Measuring the Performance of User Traffic in Home Wireless Networks.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

The Future of Programming Languages and Programmers.
Proceedings of the Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, 2015

Tomorrow's network operators will be programmers (keynote).
Proceedings of the Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, 2015

Kinetic: Verifiable Dynamic Network Control.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Measuring broadband access network performance in Pakistan: A comparative study.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Can Censorship Measurements Be Safe(r)?
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

uCap: An Internet Data Management Tool For The Home.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
OSNT: open source network tester.
IEEE Netw., 2014

The road to SDN: an intellectual history of programmable networks.
Comput. Commun. Rev., 2014

Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search.
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Locating throughput bottlenecks in home networks.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

FlowQoS: QoS for the rest of us.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

SDX: a software defined internet exchange.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

NetAssay: providing new monitoring primitives for network operators.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Exposing Inconsistent Web Search Results with Bobble.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Peering at the Internet's Frontier: A First Look at ISP Interconnectivity in Africa.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Try Before you Buy: SDN Emulation with (Real) Interdomain Routing.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Automated Detection and Fingerprinting of Censorship Block Pages.
Proceedings of the 2014 Internet Measurement Conference, 2014

PEERING: An AS for Us.
Proceedings of the 13th ACM Workshop on Hot Topics in Networks, 2014

Intentional Network Monitoring: Finding the Needle without Capturing the Haystack.
Proceedings of the 13th ACM Workshop on Hot Topics in Networks, 2014

Deniable Liaisons.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Quantifying the Effects of Circuitous Routes on the Latency of Intra-Africa Internet Traffic: A Study of Research and Education Networks.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2014

2013
Answering "What-If" Deployment and Configuration Questions With WISE: Techniques and Deployment Experience.
IEEE/ACM Trans. Netw., 2013

Improving network management with software defined networking.
IEEE Commun. Mag., 2013

Making sense of internet censorship: a new frontier for internet measurement.
Comput. Commun. Rev., 2013

Take This Personally: Pollution Attacks on Personalized Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Quantifying the benefits of joint content and network routing.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Web performance bottlenecks in broadband access networks.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Characterizing correlated latency anomalies in broadband access networks.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

A slick control plane for network middleboxes.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Community contribution award - Measuring and mitigating web performance bottlenecks in broadband access networks.
Proceedings of the 2013 Internet Measurement Conference, 2013

Understanding the domain registration behavior of spammers.
Proceedings of the 2013 Internet Measurement Conference, 2013

Peeking behind the NAT: an empirical study of home networks.
Proceedings of the 2013 Internet Measurement Conference, 2013

Measuring broadband performance in South Africa.
Proceedings of the Annual Symposium on Computing for Development, 2013

Towards impactful routing research: running your own (Emulated) as on the (Real) internet.
Proceedings of the 2013 workshop on Student workhop, 2013

Architecture for an open source network tester.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

SilverLine: preventing data leaks from compromised web applications.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Towards a cost model for network traffic.
Comput. Commun. Rev., 2012

Refactoring network infrastructure to improve manageability: a case study of home networking.
Comput. Commun. Rev., 2012

Measuring home broadband performance.
Commun. ACM, 2012

Procera: a language for high-level reactive network control.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

Accelerating last-mile web performance with popularity-based prefetching.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

User-driven dynamic traffic prioritization for home networks.
Proceedings of the 2012 ACM SIGCOMM Workshop on Measurements Up the Stack, 2012

LIFEGUARD: practical repair of persistent route failures.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Re-wiring Activity of Malicious Networks.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

Observing common spam in Twitter and email.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

#bias: Measuring the Tweeting Behavior of Propagandists.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

CORONET: Fault tolerance for Software Defined Networks.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
Modeling Tiered Pricing in the Internet Transit Market
CoRR, 2011

A survey of virtual LAN usage in campus networks.
IEEE Commun. Mag., 2011

Architecting for innovation.
Comput. Commun. Rev., 2011

Instrumenting home networks.
Comput. Commun. Rev., 2011

How many tiers?: pricing in the internet transit market.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Helping users shop for ISPs with internet nutrition labels.
Proceedings of the 2nd ACM SIGCOMM workshop on Home networks, 2011

Broadband internet performance: a view from the gateway.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Wide-area routing dynamics of malicious networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Communicating with caps: managing usage caps in home networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

The evolution of network configuration: a tale of two campuses.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Monitoring the initial DNS behavior of malicious domains.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

SilverLine: Data and Network Isolation for Cloud Services.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing, 2011

Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems.
Proceedings of the 8th Annual Collaboration, 2011

Boosting the scalability of botnet detection using adaptive traffic sampling.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Building a fast, virtualized data plane with programmable hardware.
Comput. Commun. Rev., 2010

Chipping Away at Censorship Firewalls with User-Generated Content.
Proceedings of the 19th USENIX Security Symposium, 2010

Building a Dynamic Reputation System for DNS.
Proceedings of the 19th USENIX Security Symposium, 2010

Wide-Area Route Control for Distributed Services.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

Transit portal: BGP connectivity as a service.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Autonomous traffic engineering with self-configuring topologies.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Outsourcing home network security.
Proceedings of the 2010 ACM SIGCOMM workshop on Home networks, 2010

Circumventing censorship with collage.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Network I/O fairness in virtual machines.
Proceedings of the Second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, 2010

SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Decoupling policy from configuration in campus and enterprise networks.
Proceedings of the 17th IEEE Workshop on Local and Metropolitan Area Networks, 2010

Joint analysis of network incidents and intradomain routing changes.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
Proceedings of the 18th USENIX Security Symposium, 2009

Resonance: dynamic access control for enterprise networks.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009

Dynamics of Online Scam Hosting Infrastructure.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

Characterizing VLAN-induced sharing in a campus network.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Measurement methods for fast and accurate blackhole identification with binary tomography.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Detecting network neutrality violations with causal inference.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Detecting Botnet Membership with DNSBL Counterintelligence.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

UFO: a resilient layered routing architecture.
Comput. Commun. Rev., 2008

Practical issues with using network tomography for fault diagnosis.
Comput. Commun. Rev., 2008

Photo-based authentication using social networks.
Proceedings of the first Workshop on Online Social Networks, 2008

Authenticated out-of-band communication over social links.
Proceedings of the first Workshop on Online Social Networks, 2008

Can great research be taught?: independent research with cross-disciplinary thinking and broader impact.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

Answering what-if deployment and configuration questions with wise.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Path splicing.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Accountable internet protocol (aip).
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Fast monitoring of traffic subpopulations.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

NANO: Network Access Neutrality Observatory.
Proceedings of the 7th ACM Workshop on Hot Topics in Networks, 2008

MINT: a Market for INternet Transit.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

Distinguishing persistent failures from transient losses.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

Trellis: a platform for building flexible, fast virtual networks on commodity hardware.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

Fighting spam, phishing, and online scams at the network level.
Proceedings of the AINTEC '08, 2008

2007
Network-wide prediction of BGP routes.
IEEE/ACM Trans. Netw., 2007

Implications of autonomy for the expressiveness of policy routing.
IEEE/ACM Trans. Netw., 2007

How to lease the internet in your spare time.
Comput. Commun. Rev., 2007

MobCast: Overlay Architecture for Seamless IP Mobility using Scalable Anycast Proxies.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Diagnosing network disruptions with network-wide analysis.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

Usage-based dhcp lease time optimization.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

Path Splicing: Reliable Connectivity with Rapid Recovery.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

Holding the Internet Accountable.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

Measuring the Contributions of Routing Dynamics to Prolonged End-to-End Internet Path Failures.
Proceedings of the Global Communications Conference, 2007

Multiplexing BGP sessions with BGP-Mux.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

Filtering spam with behavioral blacklisting.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Revealing Botnet Membership Using DNSBL Counter-Intelligence.
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006

Understanding the network-level behavior of spammers.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

In VINI veritas: realistic and controlled network experimentation.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Can DNS-Based Blacklists Keep Up with Bots?
Proceedings of the CEAS 2006, 2006

2005
Proactive techniques for correct and predictable Internet routing.
PhD thesis, 2005

Detecting BGP Configuration Faults with Static Analysis (Awarded Best Paper).
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Design and Implementation of a Routing Control Platform.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Geographic Locality of IP Prefixes.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
An empirical study of "bogon" route advertisements.
Comput. Commun. Rev., 2004

Practical verification techniques for wide-area routing.
Comput. Commun. Rev., 2004

Location diversity in anonymity networks.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

A model of BGP routing for network engineering.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

The case for separating routing from routers.
Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, 2004

BorderGuard: detecting cold potatoes from peers.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Guidelines for interdomain traffic engineering.
Comput. Commun. Rev., 2003

Towards a logic for wide-area Internet routing.
Comput. Commun. Rev., 2003

Measuring the effects of internet path faults on reactive routing.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

Thwarting Web Censorship with Untrusted Messenger Discovery.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

2002
Infranet: Circumventing Web Censorship and Surveillance.
Proceedings of the 11th USENIX Security Symposium, 2002

Topology inference from BGP routing dynamics.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

2001
The Dos and Don'ts of Client Authentication on the Web.
Proceedings of the 10th USENIX Security Symposium, 2001

1999
Field-To-Frame Transcoding with Spatial and Temporal Downsampling.
Proceedings of the 1999 International Conference on Image Processing, 1999


  Loading...