Center for Information Technology Policy

Filter
Conference contribution

Search results

  • 2016

    Parallel algorithms for select and partition with noisy comparisons

    Braverman, M., Mao, J. & Weinberg, S. M., Jun 19 2016, STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. Mansour, Y. & Wichs, D. (eds.). Association for Computing Machinery, p. 851-862 12 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 19-21-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    41 Scopus citations
  • PISCES: A programmable, protocol-independent software switch

    Shahbaz, M., Choi, S., Pfaff, B., Kim, C., Feamster, N. G., McKeown, N. & Rexford, J. L., Aug 22 2016, SIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, Inc, p. 525-538 14 p. 2934886. (SIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    138 Scopus citations
  • PREDATOR: Proactive recognition and elimination of domain abuse at time-of-registration

    Hao, S., Kantchelian, A., Miller, B., Paxson, V. & Feamster, N., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1568-1579 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    93 Scopus citations
  • Replex: A scalable, highly available multi-index data store

    Tai, A., Wei, M., Freedman, M. J., Abraham, I. & Malkhi, D., 2016, Proceedings of the 2016 USENIX Annual Technical Conference, USENIX ATC 2016. USENIX Association, p. 337-350 14 p. (Proceedings of the 2016 USENIX Annual Technical Conference, USENIX ATC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Replex: A scalable, highly available multi-index data store

    Tai, A., Wei, M., Freedman, M. J., Abraham, I. & Malkhi, D., Jan 1 2016, Proceedings of the 2016 USENIX Annual Technical Conference, USENIX ATC 2016. USENIX Association, p. 337-350 14 p. (Proceedings of the 2016 USENIX Annual Technical Conference, USENIX ATC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SmartWalk: Enhancing social network security via adaptive random walks

    Liu, Y., Ji, S. & Mittal, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 492-503 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    23 Scopus citations
  • SNAP: Stateful network-wide abstractions for packet processing

    Arashloo, M. T., Koral, Y., Greenberg, M., Rexford, J. L. & Walker, D. P., Aug 22 2016, SIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, Inc, p. 29-43 15 p. 2934892. (SIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    142 Scopus citations
  • The civic mission of MOOCs: Measuring engagement across political differences in forums

    Reich, J., Stewart, B. M., Mavon, K. & Tingley, D., Apr 25 2016, L@S 2016 - Proceedings of the 3rd 2016 ACM Conference on Learning at Scale. Association for Computing Machinery, Inc, p. 1-10 10 p. (L@S 2016 - Proceedings of the 3rd 2016 ACM Conference on Learning at Scale).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security

    Gennaro, R., Goldfeder, S. & Narayanan, A., 2016, Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings. Manulis, M., Schneider, S. & Sadeghi, A-R. (eds.). Springer Verlag, p. 156-174 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    146 Scopus citations
  • Visibility in digital spaces: Controlling personal information online

    Brubaker, J. R., Kaye, J., Schoenebeck, S. & Vertesi, J., Feb 27 2016, Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion, CSCW 2016 Companion. Association for Computing Machinery, p. 184-187 4 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW; vol. 26-February-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Your data center switch is trying too hard

    Jin, X., Farrington, N. & Rexford, J. L., Mar 14 2016, Symposium on Software Defined Networking (SDN) Research, SOSR 2016. Association for Computing Machinery, Inc, a12. (Symposium on Software Defined Networking (SDN) Research, SOSR 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2015

    Alpaca: Compact network policies with attribute-carrying addresses

    Kang, N., Rottenstreich, O., Rao, S. & Rexford, J. L., Dec 1 2015, Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2015. Association for Computing Machinery, Inc, 2836092. (Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Alternative trust sources: Reducing DNSSEC signature verification operations with TLS

    Donovan, S. & Feamster, N., Aug 17 2015, SIGCOMM 2015 - Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, Inc, p. 353-354 2 p. (SIGCOMM 2015 - Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • ArMOR: Defending against memory consistency model mismatches in heterogeneous architectures

    Lustig, D., Trippel, C., Pellauer, M. & Martonosi, M. R., Jun 13 2015, ISCA 2015 - 42nd Annual International Symposium on Computer Architecture, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 388-400 13 p. (Proceedings - International Symposium on Computer Architecture; vol. 13-17-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • ASwatch: An as reputation system to expose bulletproof hosting aSes

    Konte, M., Perdisci, R. & Feamster, N., Aug 17 2015, SIGCOMM 2015 - Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, Inc, p. 625-638 14 p. (SIGCOMM 2015 - Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    27 Scopus citations
  • Can censorship measurements be safe(r)?

    Jones, B. & Feamster, N., Nov 16 2015, Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV 2015. Association for Computing Machinery, Inc, 2834066. (Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Can randomized mapping secure instruction caches from side-channel attacks?

    Liu, F., Wu, H. & Lee, R. B., Jun 14 2015, Hardware and Architectural Support for Security and Privacy, HASP 2015. Association for Computing Machinery, a4. (ACM International Conference Proceeding Series; vol. 14-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • CCICheck: Using νhb graphs to verify the coherence-consistency interface

    Manerkar, Y. A., Lustig, D., Pellauer, M. & Martonosi, M. R., Dec 5 2015, Proceedings - 48th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2015. IEEE Computer Society, p. 26-37 12 p. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; vol. 05-09-December-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Scopus citations
  • Central control over distributed routing

    Vissicchio, S., Tilmans, O., Vanbever, L. & Rexford, J. L., Aug 17 2015, SIGCOMM 2015 - Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, Inc, p. 43-56 14 p. (SIGCOMM 2015 - Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    104 Scopus citations
  • Characterization and cross-platform analysis of high-throughput accelerators

    Oka, K., Jia, W., Martonosi, M. & Inoue, K., Apr 27 2015, ISPASS 2015 - IEEE International Symposium on Performance Analysis of Systems and Software. Institute of Electrical and Electronics Engineers Inc., p. 161-162 2 p. 7095797. (ISPASS 2015 - IEEE International Symposium on Performance Analysis of Systems and Software).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing

    Zhang, T. & Lee, R. B., Jun 13 2015, ISCA 2015 - 42nd Annual International Symposium on Computer Architecture, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 362-374 13 p. (Proceedings - International Symposium on Computer Architecture; vol. 13-17-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Scopus citations
  • CommGuard: Mitigating communication errors in error-prone parallel execution

    Yetim, Y., Malik, S. & Martonosi, M. R., Mar 14 2015, ASPLOS 2015 - 20th International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 311-323 13 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Compiler management of communication and parallelism for quantum computation

    Heckey, J., Patil, S., JavadiAbhari, A., Holmes, A., Kudrow, D., Brown, K. R., Franklin, D., Chong, F. T. & Martonosi, M. R., Mar 14 2015, ASPLOS 2015 - 20th International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 445-456 12 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Compositional comp cert

    Stewart, G., Beringer, L., Cuellar, S. & Appel, A. W., Jan 14 2015, POPL 2015 - Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Association for Computing Machinery, p. 275-287 13 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • Coniks: Bringing key transparency to end users

    Melara, M. S., Blankstein, A., Bonneau, J., Felten, E. W. & Freedman, M. J., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 383-398 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    151 Scopus citations
  • Coniks: Bringing key transparency to end users

    Melara, M. S., Blankstein, A., Bonneau, J., Felten, E. W. & Freedman, M. J., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 383-398 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cookies that give you away: The surveillance implications of web tracking

    Englehardt, S., Reisman, D., Eubank, C., Zimmerman, P., Mayer, J., Narayanan, A. & Felten, E. W., May 18 2015, WWW 2015 - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 289-299 11 p. (WWW 2015 - Proceedings of the 24th International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    132 Scopus citations
  • CoVisor: A compositional hypervisor for software-defined networks

    Jin, X., Gossels, J., Rexford, J. L. & Walker, D. P., 2015, Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2015. USENIX, p. 87-101 15 p. (Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    134 Scopus citations
  • De-anonymizing programmers via code stylometry

    Caliskan-Islam, A., Harang, R., Liu, A., Narayanan, A., Voss, C., Yamaguchi, F. & Greenstadt, R., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 255-270 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    155 Scopus citations
  • DeSC: Decoupled supply-compute communication management for heterogeneous architectures

    Ham, T. J., Aragón, J. L. & Martonosi, M. R., Dec 5 2015, Proceedings - 48th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2015. IEEE Computer Society, p. 191-203 13 p. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; vol. 05-09-December-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    50 Scopus citations
  • Disruptive prefetching: Impact on side-channel attacks and cache designs

    Fuchs, A. & Lee, R. B., May 26 2015, SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference. Association for Computing Machinery, Inc, 2757672. (SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Dynamic adaptive techniques for learning application delay tolerance for mobile data offloading

    Yetim, O. B. & Martonosi, M. R., Aug 21 2015, 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 1885-1893 9 p. 7218571. (Proceedings - IEEE INFOCOM; vol. 26).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Efficient traffic splitting on commodity switches

    Kang, N., Ghobadi, M., Reumann, J., Rexford, J. L. & Shraer, A., Dec 1 2015, Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2015. Association for Computing Machinery, Inc, 2836091. (Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    72 Scopus citations
  • Encore: Lightweight measurement of web censorship with cross-origin requests

    Burnett, S. & Feamster, N., Aug 17 2015, SIGCOMM 2015 - Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, Inc, p. 653-667 15 p. (SIGCOMM 2015 - Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    34 Scopus citations
  • Ethical concerns for censorship measurement

    Jones, B., Ensafi, R., Feamster, N., Paxson, V. & Weaver, N., Aug 21 2015, NS Ethics 2015 - Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, part of SIGCOMM 2015. Association for Computing Machinery, Inc, p. 17-20 4 p. (NS Ethics 2015 - Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, part of SIGCOMM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Evaluation of the use of fiber optic sensors in identification of fresco fracturing patterns

    Glisic, B., Sigurdardottir, D. & Dobkin, D. P., 2015, Sensors and Smart Structures Technologies for Civil, Mechanical, and Aerospace Systems 2015. Sohn, H., Wang, K-W. & Lynch, J. P. (eds.). SPIE, 943521. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9435).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Examining how the great firewall discovers hidden circumvention servers

    Ensafi, R., Fifield, D., Winter, P., Feamster, N., Weaver, N. & Paxson, V., Oct 28 2015, IMC 2015 - Proceedings of the 2015 ACM Internet Measurement Conference. Association for Computing Machinery, p. 445-458 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    65 Scopus citations
  • Exploiting temporal dynamics in Sybil defenses

    Liu, C., Gao, P., Wright, M. & Mittal, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 805-816 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    25 Scopus citations
  • Implicit authentication for smartphone security

    Lee, W. H. & Lee, R. B., 2015, 1st International Conference on Information Systems Security and Privacy, ICISSP 2015. Camp, O., Aïmeur, E., Weippl, E. & Bidan, C. (eds.). Springer Verlag, p. 160-176 17 p. (Communications in Computer and Information Science; vol. 576).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Kinetic: Verifiable dynamic network control

    Kim, H., Reich, J., Gupta, A., Shahbaz, M., Feamster, N. & Clark, R., 2015, Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2015. USENIX, p. 59-72 14 p. (Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    115 Scopus citations
  • Last-level cache side-channel attacks are practical

    Liu, F., Yarom, Y., Ge, Q., Heiser, G. & Lee, R. B., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 605-622 18 p. 7163050. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    779 Scopus citations
  • Measuring broadband access network performance in Pakistan: A comparative study

    Awan, M. F., Ahmad, T., Qaisar, S., Feamster, N. & Sundaresan, S., Dec 24 2015, Proceedings of the 40th Annual IEEE Conference on Local Computer Networks, LCN 2015. Kanhere, S., Cherkaoui, S. & Tolle, J. (eds.). IEEE Computer Society, p. 595-602 8 p. 7365903. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2015-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Measuring the performance of user traffic in home wireless networks

    Sundaresan, S., Feamster, N. & Teixeira, R., 2015, Passive and Active Measurement - 16th International Conference, PAM 2015, Proceedings. Liu, Y. & Mirkovic, J. (eds.). Springer Verlag, p. 305-317 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    18 Scopus citations
  • Monitoring internet censorship with UBICA

    Aceto, G., Botta, A., Pescapè, A., Feamster, N., Faheem Awan, M., Ahmad, T. & Qaisar, S., 2015, Traffic Monitoring and Analysis - 7th International Workshop, TMA 2015, Proceedings. Barlet-Ros, P., Bonaventure, O. & Steiner, M. (eds.). Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9053).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    12 Scopus citations
  • Multi-sensor authentication to improve smartphone security

    Lee, W. H. & Lee, R. B., 2015, ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy, Proceedings. Camp, O., Weippl, E., Bidan, C. & Aimeur, E. (eds.). SciTePress, p. 270-280 11 p. (ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    88 Scopus citations
  • Programming slick network functions

    Anwer, B., Benson, T., Feamster, N. & Levin, D., Jun 17 2015, Symposium on Software Defined Networking (SDN) Research, SOSR 2015. Association for Computing Machinery, Inc, 2774998. (Symposium on Software Defined Networking (SDN) Research, SOSR 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Scopus citations
  • Quantifying the effects of circuitous routes on the latency of intra-africa internet traffic: A study of research and education networks

    Chavula, J., Feamster, N., Bagula, A. & Suleman, H., 2015, e-Infrastructure and e-Services for Developing Countries - 6th International Conference, AFRICOMM 2014, Revised Selected Papers. Sansa-Otim, J., Nungu, A. & Pehrson, B. (eds.). Springer Verlag, p. 64-73 10 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 147).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Random Fill Cache Architecture

    Liu, F. & Lee, R. B-L., Jan 15 2015, Proceedings - 47th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2014. January ed. IEEE Computer Society, p. 203-215 13 p. 7011389. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; vol. 2015-January, no. January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    130 Scopus citations
  • Raptor: Routing attacks on privacy in tor

    Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M. & Mittal, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Raptor: Routing attacks on privacy in tor

    Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M. & Mittal, P., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    143 Scopus citations