Phillipa Gill

Affiliations:
  • University of Massachusetts - Amherst


According to our database1, Phillipa Gill authored at least 67 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
M-Lab: user initiated internet data for the research community.
Comput. Commun. Rev., 2022

Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

2021
Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting.
Proc. Priv. Enhancing Technol., 2021

PredictRoute: A Network Path Prediction Toolkit.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Data-driven networking research: models for academic collaboration with industry (a Google point of view).
Comput. Commun. Rev., 2021

How Great is the Great Firewall? Measuring China's DNS Censorship.
Proceedings of the 30th USENIX Security Symposium, 2021

Cache Me Outside: A New Look at DNS Cache Probing.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

2020
The web is still small after more than a decade.
Comput. Commun. Rev., 2020

Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

ICLab: A Global, Longitudinal Internet Censorship Measurement Platform.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN's gTLD Experiments.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020

Assessing the Privacy Benefits of Domain Name Encryption.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
BGP hijacking classification.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

A large-scale analysis of deployed traffic differentiation practices.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

2018
Information Market for Web Browsing: Design, Usability and Incremental Adoption.
SIGMETRICS Perform. Evaluation Rev., 2018

Secure Routing for the Internet (Dagstuhl Seminar 18242).
Dagstuhl Reports, 2018

Analyzing China's Blocking of Unpublished Tor Bridges.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

RADWAN: rate adaptive wide area network.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

The Cloud that Runs the Mobile Internet: A Measurement Study of Mobile Cloud Services.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation.
Proceedings of the Internet Measurement Conference 2018, 2018

Characterizing the Deployment and Performance of Multi-CDNs.
Proceedings of the Internet Measurement Conference 2018, 2018

Beyond Binary Failures in Networks.
Proceedings of the Applied Networking Research Workshop, 2018

2017
Online Political Discourse in the Trump Era.
CoRR, 2017

Characterizing the Nature and Dynamics of Tor Exit Blocking.
Proceedings of the 26th USENIX Security Symposium, 2017

Measuring Offensive Speech in Online Political Discourse.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

lib•erate, (n): a library for exposing (traffic-classification) rules and avoiding them efficiently.
Proceedings of the 2017 Internet Measurement Conference, 2017

Run, Walk, Crawl: Towards Dynamic Link Capacities.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017

Studying TLS Usage in Android Apps.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

2016
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms.
Proc. Priv. Enhancing Technol., 2016

Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem.
CoRR, 2016

Exploring the Design Space of Longitudinal Censorship Measurement Platforms.
CoRR, 2016

Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design.
CoRR, 2016

The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

PathCache: A Path Prediction Toolkit.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Measuring and Mitigating AS-level Adversaries Against Tor.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Games without Frontiers: Investigating Video Games as a Covert Channel.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data.
ACM Trans. Web, 2015

Haystack: In Situ Mobile Traffic Analysis in User Space.
CoRR, 2015

Internet Outages, the Eyewitness Accounts: Analysis of the Outages Mailing List.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

Identifying Traffic Differentiation in Mobile Networks.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Investigating Interdomain Routing Policies in the Wild.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
A survey of interdomain routing policies.
Comput. Commun. Rev., 2014

Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Identifying traffic differentiation on cellular data networks.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

A First Look at Performance in Mobile Virtual Network Operators.
Proceedings of the 2014 Internet Measurement Conference, 2014

Automated Detection and Fingerprinting of Censorship Block Pages.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Characterizing Large-Scale Routing Anomalies: A Case Study of the China Telecom Incident.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Best paper - Follow the money: understanding economics of online aggregation and advertising.
Proceedings of the 2013 Internet Measurement Conference, 2013

A method for identifying and confirming the use of URL filtering products for censorship.
Proceedings of the 2013 Internet Measurement Conference, 2013

2012
Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data.
Comput. Commun. Rev., 2012

2011
Characterizing Organizational Use of Web-Based Services: Methodology, Challenges, Observations, and Insights.
ACM Trans. Web, 2011

Characterizing Intelligence Gathering and Control on an Edge Network.
ACM Trans. Internet Techn., 2011

A Socratic method for validation of measurement-based networking research.
Comput. Commun., 2011

Let the market drive deployment: a strategy for transitioning to BGP security.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Understanding network failures in data centers: measurement, analysis, and implications.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Short paper: a look at smartphone permission models.
Proceedings of the SPSM'11, 2011

2010
Understanding latent sector errors and how to protect against them.
ACM Trans. Storage, 2010

Dude, Where's That IP? Circumventing Measurement-based IP Geolocation.
Proceedings of the 19th USENIX Security Symposium, 2010

2009
The Booze Cruise: Impaired Driving in Virtual Spaces.
IEEE Computer Graphics and Applications, 2009

2008
Scalable on-demand media streaming for heterogeneous clients.
ACM Trans. Multim. Comput. Commun. Appl., 2008

A few chirps about twitter.
Proceedings of the first Workshop on Online Social Networks, 2008

The Flattening Internet Topology: Natural Evolution, Unsightly Barnacles or Contrived Collapse?.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Network Information Flow in Network of Queues.
Proceedings of the 16th International Symposium on Modeling, 2008

2007
Youtube traffic characterization: a view from the edge.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007


  Loading...