Conferences

Search results

    TitleConferenceSpeaker(s)
    Securing Distributed Systems with Information Flow ControlNSDI '08Nickolai Zeldovich, Silas Boyd-Wickizer, David Mazières
    Wedge: Splitting Applications into Reduced-Privilege CompartmentsNSDI '08Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp
    Reducing Network Energy Consumption via Sleeping and Rate-AdaptationNSDI '08Sergiu Nedevschi, Lucian Popa, Gianluca Iannaccone, Sylvia Ratnasamy, David Wetherall
    Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet ServicesNSDI '08Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas Rigas, Lin Xiao, Feng Zhao
    Consensus Routing: The Internet as a Distributed SystemNSDI '08John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, Thomas Anderson, Arun Venkataramani
    Passport: Secure and Adoptable Source AuthenticationNSDI '08Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
    Context-based Routing: Technique, Applications, and ExperienceNSDI '08Saumitra Das, Yunnan Wu, Ranveer Chandra, Y. Charlie Hu
    NetComplex: A Complexity Metric for Networked System DesignsNSDI '08Byung-Gon Chun, Sylvia Ratnasamy, Eddie Kohler
    DieCast: Testing Distributed Systems with an Accurate Scale ModelNSDI '08Diwaker Gupta, Kashi V. Vishwanath
    D3S: Debugging Deployed Distributed SystemsNSDI '08Xuezheng Liu, Zhenyu Guo, Xi Wang, Feibo Chen, Xiaochen Lian, Jian Tang, Ming Wu, Zheng Zhang
    On the Spam Campaign TrailLEET '08Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage
    Characterizing Botnets from Email Spam RecordsLEET '08Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J.D. Tygar
    Peeking into Spammer Behavior from a Unique Vantage PointLEET '08Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao
    Behind Phishing: An Examination of Phisher Modi OperandiLEET '08D. Kevin McGrath, Minaxi Gupta
    Designing and Implementing Malicious HardwareLEET '08Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
    Catching Instant Messaging Worms with Change-Point Detection TechniquesLEET '08Guanhua Yan, Zhen Xiao, Stephan Eidenbenz
    Exploiting Machine Learning to Subvert Your Spam FilterLEET '08Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia
    Conducting Cybersecurity Research Legally and EthicallyLEET '08Aaron J. Burstein
    Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormLEET '08Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling
    The Heisenbot Uncertainty Problem: Challenges in Separating Bots from ChaffLEET '08Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage
    Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareLEET '08Michalis Polychronakis, Panayiotis Mavrommatis
    Work-in-Progress SessionLEET '08
    "It's like a fire. You just have to move on": Rethinking Personal Digital ArchivingFAST '08Cathy Marshall
    Scalable Performance of the Panasas Parallel File SystemFAST '08Brent Welch, Marc Unangst, Zainul Abbasi, Garth Gibson, Brian Mueller, Jason Small, Jim Zelenka, Bin Zhou
    TierStore: A Distributed Filesystem for Challenged Networks in Developing RegionsFAST '08Michael Demmer, Bowei Du, Eric Brewer

Pages