Papers

Search results

    ConferenceTitleAuthor(s)
    NSDI '08Uncovering Performance Differences Among Backbone ISPs with NetdiffRatul Mahajan, Ming Zhang, Lindsey Poole, Vivek Pai
    NSDI '08Effective Diagnosis of Routing Disruptions from End SystemsYing Zhang, Z. Morley Mao
    NSDI '08CSAMP: A System for Network-Wide Flow MonitoringVyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella
    NSDI '08Studying Black Holes in the Internet with HubbleEthan Katz-Bassett, Harsha V. Madhyastha, John P. John, David Wetherall, homas Anderson
    NSDI '08Maelstrom: Transparent Error Correction for Lambda NetworksEinar Vollset
    NSDI '08Swift: A Fast Dynamic Packet FilterZhenyu Wu, Mengjun Xie, Haining Wang
    NSDI '08Securing Distributed Systems with Information Flow ControlNickolai Zeldovich, Silas Boyd-Wickizer, David Mazières
    NSDI '08Wedge: Splitting Applications into Reduced-Privilege CompartmentsAndrea Bittau, Petr Marchenko, Mark Handley, Brad Karp
    NSDI '08Reducing Network Energy Consumption via Sleeping and Rate-AdaptationSergiu Nedevschi, Lucian Popa, Gianluca Iannaccone, Sylvia Ratnasamy, David Wetherall
    NSDI '08Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet ServicesGong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas Rigas, Lin Xiao, Feng Zhao
    NSDI '08Consensus Routing: The Internet as a Distributed SystemJohn P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, Thomas Anderson, Arun Venkataramani
    NSDI '08Passport: Secure and Adoptable Source AuthenticationXin Liu, Ang Li, Xiaowei Yang, David Wetherall
    NSDI '08Context-based Routing: Technique, Applications, and ExperienceSaumitra Das, Yunnan Wu, Ranveer Chandra, Y. Charlie Hu
    NSDI '08NetComplex: A Complexity Metric for Networked System DesignsByung-Gon Chun, Sylvia Ratnasamy, Eddie Kohler
    NSDI '08DieCast: Testing Distributed Systems with an Accurate Scale ModelDiwaker Gupta, Kashi V. Vishwanath
    NSDI '08D3S: Debugging Deployed Distributed SystemsXuezheng Liu, Zhenyu Guo, Xi Wang, Feibo Chen, Xiaochen Lian, Jian Tang, Ming Wu, Zheng Zhang
    LEET '08On the Spam Campaign TrailChristian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage
    LEET '08Characterizing Botnets from Email Spam RecordsLi Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J.D. Tygar
    LEET '08Peeking into Spammer Behavior from a Unique Vantage PointAbhinav Pathak, Y. Charlie Hu, Z. Morley Mao
    LEET '08Behind Phishing: An Examination of Phisher Modi OperandiD. Kevin McGrath, Minaxi Gupta
    LEET '08Designing and Implementing Malicious HardwareSamuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
    LEET '08Catching Instant Messaging Worms with Change-Point Detection TechniquesGuanhua Yan, Zhen Xiao, Stephan Eidenbenz
    LEET '08Exploiting Machine Learning to Subvert Your Spam FilterBlaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia
    LEET '08Conducting Cybersecurity Research Legally and EthicallyAaron J. Burstein
    LEET '08Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormThorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling

    Pages