Biblio

Export 26 results:
Filters: Author is Nick Feamster  [Clear All Filters]
2020
Hounsel A, Holland J, Kaiser B, Borgolte K, Feamster N, Mayer J.  2020.  Identifying Disinformation Websites Using Infrastructure Features. 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20).
2019
Apthorpe N, Varghese S, Feamster N.  2019.  Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA. 28th USENIX Security Symposium (USENIX Security 19). :123--140.
Datta T, Feamster N, Rexford J, Wang L.  2019.  SPINE: Surveillance Protection in the Network Elements. 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19).
2018
Hounsel A, Mittal P, Feamster N.  2018.  Automatically Generating a Large, Culture-Specific Blocklist for China. 8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 18).
Winter P, Edmundson A, Roberts LM, Dutkowska-Żuk A, Chetty M, Feamster N.  2018.  How Do Tor Users Interact With Onion Services? 27th {USENIX} Security Symposium ({USENIX} Security 18). :411--428.
2017
Pearce P, Jones B, Li F, Ensafi R, Feamster N, Weaver N, Paxson V.  2017.  Global Measurement of DNS Manipulation. 26th {USENIX} Security Symposium ({USENIX} Security 17). :307--323.
2016
Winter P, Ensafi R, Loesing K, Feamster N.  2016.  Identifying and Characterizing Sybils in the Tor Network. 25th {USENIX} Security Symposium ({USENIX} Security 16). :1169--1185.
Gupta A, MacDavid R, Birkner R, Canini M, Feamster N, Rexford J, Vanbever L.  2016.  An Industrial-Scale Software Defined Internet Exchange Point. 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). :1--14.
Gupta A, MacDavid R, Birkner R, Canini M, Feamster N, Rexford J, Vanbever L.  2016.  An Industrial-Scale Software Defined Internet Exchange Point. 2016 {USENIX} Annual Technical Conference ({USENIX} {ATC} 16).
2015
Kim H, Reich J, Gupta A, Shahbaz M, Feamster N, Clark R.  2015.  Kinetic: Verifiable Dynamic Network Control. 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15). :59--72.
2013
Xing X, Meng W, Doozan D, Snoeren AC, Feamster N, Lee W.  2013.  Take This Personally: Pollution Attacks on Personalized Services. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :671--686.
2011
Feamster N, Lee W.  2011.  Opening Remarks. {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 11).
Mundada Y, Ramachandran A, Feamster N.  2011.  SilverLine: Data and Network Isolation for Cloud Services. 3rd {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 11).
2010
Perdisci R, Lee W, Feamster N.  2010.  Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. 7th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 10).
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a Dynamic Reputation System for DNS. 19th {USENIX} Security Symposium ({USENIX} Security 10).
Burnett S, Feamster N, Vempala S.  2010.  Chipping Away at Censorship Firewalls with User-Generated Content. 19th {USENIX} Security Symposium ({USENIX} Security 10).
Valancius V, Feamster N, Rexford J, Nakao A.  2010.  Wide-Area Route Control for Distributed Services. 2010 {USENIX} Annual Technical Conference ({USENIX} {ATC} 10).
2006
Ramachandran A, Feamster N, Dagon D.  2006.  Revealing Botnet Membership Using DNSBL Counter-Intelligence. 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet ({SRUTI} 06).
2005
Caesar M, Caldwell D, Feamster N, Van der Merwe J, Shaikh A.  2005.  Design and Implementation of a Routing Control Platform. 2nd Symposium on Networked Systems Design & Implementation ({NSDI} 05).
Feamster N, Balakrishnan H.  2005.  Detecting BGP Configuration Faults with Static Analysis. 2nd Symposium on Networked Systems Design & Implementation ({NSDI} 05).
Freedman MJ, Vutukuru M, Feamster N, Balakrishnan H.  2005.  Geographic Locality of IP Prefixes. Internet Measurement Conference 2005 ({IMC} 05).

Pages