NSDI '08 | Uncovering Performance Differences Among Backbone ISPs with Netdiff | Ratul Mahajan, Ming Zhang, Lindsey Poole, Vivek Pai |
NSDI '08 | Effective Diagnosis of Routing Disruptions from End Systems | Ying Zhang, Z. Morley Mao |
NSDI '08 | CSAMP: A System for Network-Wide Flow Monitoring | Vyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella |
NSDI '08 | Studying Black Holes in the Internet with Hubble | Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, David Wetherall, homas Anderson |
NSDI '08 | Maelstrom: Transparent Error Correction for Lambda Networks | Einar Vollset |
NSDI '08 | Swift: A Fast Dynamic Packet Filter | Zhenyu Wu, Mengjun Xie, Haining Wang |
NSDI '08 | Securing Distributed Systems with Information Flow Control | Nickolai Zeldovich, Silas Boyd-Wickizer, David Mazières |
NSDI '08 | Wedge: Splitting Applications into Reduced-Privilege Compartments | Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp |
NSDI '08 | Reducing Network Energy Consumption via Sleeping and Rate-Adaptation | Sergiu Nedevschi, Lucian Popa, Gianluca Iannaccone, Sylvia Ratnasamy, David Wetherall |
NSDI '08 | Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services | Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas Rigas, Lin Xiao, Feng Zhao |
NSDI '08 | Consensus Routing: The Internet as a Distributed System | John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, Thomas Anderson, Arun Venkataramani |
NSDI '08 | Passport: Secure and Adoptable Source Authentication | Xin Liu, Ang Li, Xiaowei Yang, David Wetherall |
NSDI '08 | Context-based Routing: Technique, Applications, and Experience | Saumitra Das, Yunnan Wu, Ranveer Chandra, Y. Charlie Hu |
NSDI '08 | NetComplex: A Complexity Metric for Networked System Designs | Byung-Gon Chun, Sylvia Ratnasamy, Eddie Kohler |
NSDI '08 | DieCast: Testing Distributed Systems with an Accurate Scale Model | Diwaker Gupta, Kashi V. Vishwanath |
NSDI '08 | D3S: Debugging Deployed Distributed Systems | Xuezheng Liu, Zhenyu Guo, Xi Wang, Feibo Chen, Xiaochen Lian, Jian Tang, Ming Wu, Zheng Zhang |
LEET '08 | On the Spam Campaign Trail | Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
LEET '08 | Characterizing Botnets from Email Spam Records | Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J.D. Tygar |
LEET '08 | Peeking into Spammer Behavior from a Unique Vantage Point | Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao |
LEET '08 | Behind Phishing: An Examination of Phisher Modi Operandi | D. Kevin McGrath, Minaxi Gupta |
LEET '08 | Designing and Implementing Malicious Hardware | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou |
LEET '08 | Catching Instant Messaging Worms with Change-Point Detection Techniques | Guanhua Yan, Zhen Xiao, Stephan Eidenbenz |
LEET '08 | Exploiting Machine Learning to Subvert Your Spam Filter | Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia |
LEET '08 | Conducting Cybersecurity Research Legally and Ethically | Aaron J. Burstein |
LEET '08 | Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling |