Biblio

Export 13 results:
Filters: Author is Nicholas Weaver  [Clear All Filters]
2017
Jermyn J, Weaver N.  2017.  Autosonda: Discovering Rules and Triggers of Censorship Devices . 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17).
2015
Marczak B, Weaver N, Dalek J, Ensafi R, Fifield D, McKune S, Rey A, Scott-Railton J, Deibert R, Paxson V.  2015.  An Analysis of China’s “Great Cannon”. 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15).
Zheng X, Jiang J, Liang J, Duan H, Chen S, Wan T, Weaver N.  2015.  Cookies Lack Integrity: Real-World Implications. 24th USENIX Security Symposium (USENIX Security 15). :707--721.
2011
Weaver N, Kreibich C, Paxson V.  2011.  Redirecting DNS for Ads and Profit. USENIX Workshop on Free and Open Communications on the Internet (FOCI 11).
Kanich C, Weaver N, McCoy D, Halvorson T, Kreibich C, Levchenko K, Paxson V, Voelker GM, Savage S.  2011.  Show Me the Money: Characterizing Spam-advertised Revenue. 20th USENIX Security Symposium (USENIX Security 11).
2008
Allman M, Kreibich C, Paxson V, Sommer R, Weaver N.  2008.  Principles for Developing Comprehensive Network Visibility. 3rd USENIX Workshop on Hot Topics in Security (HotSec 08).
2007
Allman M, Kreibich C, Paxson V, Sommer R, Weaver N.  2007.  The Strengths of Weaker Identities: Opportunistic Personas. 2nd USENIX Workshop on Hot Topics in Security (HotSec 07).
Weaver N, Sommer R.  2007.  Stress Testing Cluster Bro. DETER Community Workshop on Cyber Security Experimentation and Test 2007 (DETER 2007).
2004
Weaver N, Staniford S, Paxson V.  2004.  Very Fast Containment of Scanning Worms. 13th USENIX Security Symposium (USENIX Security 04).
2002
Staniford S, Paxson V, Weaver N.  2002.  How to Own the Internet in Your Spare Time. 11th USENIX Security Symposium (USENIX Security 02).