Biblio

Export 26 results:
Filters: Author is Nick Feamster  [Clear All Filters]
2020
Hounsel A, Holland J, Kaiser B, Borgolte K, Feamster N, Mayer J.  2020.  Identifying Disinformation Websites Using Infrastructure Features. 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20).
2019
Apthorpe N, Varghese S, Feamster N.  2019.  Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA. 28th USENIX Security Symposium (USENIX Security 19). :123--140.
Datta T, Feamster N, Rexford J, Wang L.  2019.  SPINE: Surveillance Protection in the Network Elements. 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19).
2018
Hounsel A, Mittal P, Feamster N.  2018.  Automatically Generating a Large, Culture-Specific Blocklist for China. 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18).
Winter P, Edmundson A, Roberts LM, Dutkowska-Żuk A, Chetty M, Feamster N.  2018.  How Do Tor Users Interact With Onion Services? 27th USENIX Security Symposium (USENIX Security 18). :411--428.
2017
Pearce P, Jones B, Li F, Ensafi R, Feamster N, Weaver N, Paxson V.  2017.  Global Measurement of DNS Manipulation. 26th USENIX Security Symposium (USENIX Security 17). :307--323.
2016
Winter P, Ensafi R, Loesing K, Feamster N.  2016.  Identifying and Characterizing Sybils in the Tor Network. 25th USENIX Security Symposium (USENIX Security 16). :1169--1185.
Gupta A, MacDavid R, Birkner R, Canini M, Feamster N, Rexford J, Vanbever L.  2016.  An Industrial-Scale Software Defined Internet Exchange Point. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :1--14.
Gupta A, MacDavid R, Birkner R, Canini M, Feamster N, Rexford J, Vanbever L.  2016.  An Industrial-Scale Software Defined Internet Exchange Point. 2016 USENIX Annual Technical Conference (USENIX ATC 16).
2015
Kim H, Reich J, Gupta A, Shahbaz M, Feamster N, Clark R.  2015.  Kinetic: Verifiable Dynamic Network Control. 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). :59--72.
2013
Xing X, Meng W, Doozan D, Snoeren AC, Feamster N, Lee W.  2013.  Take This Personally: Pollution Attacks on Personalized Services. 22nd USENIX Security Symposium (USENIX Security 13). :671--686.
2011
Feamster N, Lee W.  2011.  Opening Remarks. USENIX Workshop on Free and Open Communications on the Internet (FOCI 11).
Mundada Y, Ramachandran A, Feamster N.  2011.  SilverLine: Data and Network Isolation for Cloud Services. 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 11).
2010
Perdisci R, Lee W, Feamster N.  2010.  Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a Dynamic Reputation System for DNS. 19th USENIX Security Symposium (USENIX Security 10).
Burnett S, Feamster N, Vempala S.  2010.  Chipping Away at Censorship Firewalls with User-Generated Content. 19th USENIX Security Symposium (USENIX Security 10).
Valancius V, Feamster N, Rexford J, Nakao A.  2010.  Wide-Area Route Control for Distributed Services. 2010 USENIX Annual Technical Conference (USENIX ATC 10).
2006
Ramachandran A, Feamster N, Dagon D.  2006.  Revealing Botnet Membership Using DNSBL Counter-Intelligence. 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06).
2005
Caesar M, Caldwell D, Feamster N, Van der Merwe J, Shaikh A.  2005.  Design and Implementation of a Routing Control Platform. 2nd Symposium on Networked Systems Design & Implementation (NSDI 05).
Feamster N, Balakrishnan H.  2005.  Detecting BGP Configuration Faults with Static Analysis. 2nd Symposium on Networked Systems Design & Implementation (NSDI 05).
Freedman MJ, Vutukuru M, Feamster N, Balakrishnan H.  2005.  Geographic Locality of IP Prefixes. Internet Measurement Conference 2005 (IMC 05).

Pages