Robin Sommer

According to our database1, Robin Sommer authored at least 45 papers between 2002 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Viable Protection of High-Performance Networks through Hardware/Software Co-Design.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

2016
Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

Exploring Tor's Activity Through Long-Term Passive TLS Traffic Measurement.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Spicy: a unified deep packet inspection framework for safely dissecting all your data.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates.
TinyToCS, 2015

Providing Dynamic Control to Passive Network Security Monitoring.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

On the Reliability of Profile Matching Across Large Online Social Networks.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Content-Based Privacy for Consumer-Produced Multimedia.
Proceedings of the Multimedia Data Mining and Analytics - Disruptive Innovation, 2015

2014
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014

Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Through the eye of the PLC: semantic security monitoring for industrial processes.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Exploiting innocuous activity for correlating users across sites.
Proceedings of the 22nd International World Wide Web Conference, 2013

Here's my cert, so trust me, maybe?: understanding TLS errors on the web.
Proceedings of the 22nd International World Wide Web Conference, 2013

No attack necessary: the surprising dynamics of SSL trust relationships.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Investigating IPv6 Traffic - What Happened at the World IPv6 Day?
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

2011
Sherlock holmes' evil twin: on the impact of global inference for online privacy.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

An Assessment of Overt Malicious Activity Manifest in Residential Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Cybercasing the Joint: On the Privacy Implications of Geo-Tagging.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

2009
An architecture for exploiting multi-core processors to parallelize network intrusion prevention.
Concurrency and Computation: Practice and Experience, 2009

Detecting Forged TCP Reset Packets.
Proceedings of the Network and Distributed System Security Symposium, 2009

Securing Mediated Trace Access Using Black-box Permutation Analysis.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
Principles for Developing Comprehensive Network Visibility.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Predicting the resource consumption of network intrusion detection systems.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

Enriching network security analysis with time travel.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Predicting the Resource Consumption of Network Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
Stress Testing Cluster Bro.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

2006
Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

binpac: a yacc for writing application protocol parsers.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
Viable network intrusion detection in high-performance environments.
PhD thesis, 2005

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic.
Proceedings of the 5th Internet Measurement Conference, 2005

Policy-Controlled Event Management for Distributed Intrusion Detection.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
Proceedings of the Detection of Intrusions and Malware, 2005

Exploiting Independent State For Network Intrusion Detection.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Packet trace manipulation rramework for test labs.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

Operational experiences with high-volume network intrusion detection.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Bro: An Open Source Network Intrusion Detection System.
Proceedings of the Security, 2003

Enhancing byte-level network intrusion detection signatures with context.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
NetFlow: information loss or win?
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002


  Loading...