banner

The systems and networking group at UCSD engages in a wide range of experimental and theoretical research. Our current projects span fault-tolerant networks and systems, high-speed router design, storage system design, network measurement and traffic analysis, peer-to-peer system design, network security, mobile code architectures, high-performance cluster computing, and wireless networking. Our group consists of eight core faculty, five affiliated faculty (in a broad range of areas including security, machine learning and programming languages) and over 50 graduate students and research staff.

People  |   News  |   Publications  |   Sponsors   |   Internal
Faculty
Joseph Pasquale
George Porter
Stefan Savage
Aaron Schulman
Alex C. Snoeren
Geoffrey M. Voelker
Yuanyuan Zhou
Scientists and Postdocs
Kirill Levchenko
William M. Mellette
Ken Yocum
Affiliated Faculty
kc claffy (CAIDA)
Ranjit Jhala
Sorin Lerner
George Papen (ECE)
Lawrence Saul
Hovav Shacham
Deian Stefan
Steve Swanson
Tajana Šimunić Rosing
Research Staff
Brian Kantor
Cindy Moore
 
PhD Students
Gautam Akiwate
Lixiang Ao
Nishant Bhaskar
Sunjay Cauligi
Sam Crow
Rajdeep Das
Joe DeBlasio
Louis DeKoven
Brown Farinholt
Alex Forencich
Alex Gamero-Garrido
Danny Huang
Brian Johannesmeyer
Moein Khazraee
Guo "Vector" Li
Rob McGuinness
Ariana Mirian
Arjun Roy
Bingyu Shen
Gary Soeller
Shelby Thomas
Shu-Ting Wang
Yudong Wu
Chengcheng Xiang
Tianyin Xu
Zhaomo Yang
MS Students
Nadah Feteih
Liz Izhikevich
Rohit Kulkarni
Administrative Staff
Jennifer Folkestad
 
Recent Alumni
Xinxin Jin (Ph.D. 2017) Whova

Karl Koscher (Postdoc 2014–2016) University of Washington

Karyn Benson (Ph.D. 2016) Akamai
Peng Huang (Ph.D. 2016) MSR (Postdoc)Johns Hopkins University
Wilson Lian (Ph.D. 2016) Google

Neha Chachra (Ph.D. 2015) Facebook
Rishan Chen (2015) Whova
Mike Conley (Ph.D. 2015) Google
Matthew Der (Ph.D. 2015) notch.io
Tristan Halvorson (Ph.D. 2015)Google
Rishi Kapoor (Ph.D. 2015)Google
He Liu (Lonnie) (Ph.D. 2015)Google
Keaton Mowery (Ph.D. 2015)Apple
Malveeka Tewari (Ph.D. 2015)Google
Bhanu Vattikonda (Ph.D. 2015) Apple
Jing Zheng (2015) Oracle

Karthik Balasubramaniam (M.S. 2017) Amazon

Rahul Bhalerao (M.S. 2016) Amazon
Benjamin Braun (M.S. 2016) Facebook
Jacob Maskiewicz (M.S. 2016) Facebook
Liqiong Yang (M.S. 2016) Google

Gautam Akiwate (M.S. 2015) PureStorage
Tao Cai (M.S. 2015) LinkedIn
Ian Foster (M.S. 2015) Salesforce
Mohit Kothari (M.S. 2015) Groupon
Sen Zhang (M.S. 2015) Google

Kathy Krane (CNS MSO 2008-2015) South County Center for Change

[All Alumni]
Recent News

March 11— The spring hike was in the Santa Ana Mountains, hiking from Highway 74 to Sitton Peak. The hike had great views of Orange County and the ocean. Delicious bonus: the hike ends at a candy shop.   (Pics)   (GPS Track)   (All Hikes)

XinXin Jin May 2— Congratulations to XinXin Jin, who successfully defended her dissertation today on "Tooling and Language Support for Robust and Easy Network Programming of Mobile Applications"! XinXin has been working at Whova, and now will be devoting her full-time attention there.

March 28— Today at NSDI, George Porter and his colleagues received the 2017 "Test-of-Time" award, which recognizes papers at least 10 years old that have had significant and lasting impact on the field. This award was for their work on X-Trace (NSDI 2007), which showed how to do correctness and performance debugging in distributed network-based applications and formed a key portion of George's dissertation. Congratulations George! George Porter

March 11— The winter hike this year was in Borrego Palm Springs. The flowers were in rare bloom and the stream in full torrent from the rains this year, and it was well worth the traffic jam to get there. We hiked up the canyon up to and beyond the palms.   (Pics)   (GPS Track)   (All Hikes)
[All News]
Recent Publications

Passive Realtime Datacenter Fault Detection and Localization, Arjun Roy, Hongyi Zeng, Jasmeet Bagga, and Alex C. Snoeren, USENIX ;login: 42(3), 2017.

Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research, Alex Gamero-Garrido, Stefan Savage, Kirill Levchenko, and Alex C. Snoeren, Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, November 2017.

Tripwire: Inferring Internet Site Compromise, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference, London, UK, November 2017.

Exploring the Dynamics of Search Advertiser Fraud, Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference, London, UK, November 2017.

PacketLab: A Universal Measurement Endpoint Interface, Kirill Levchenko, Amogh Dhamdhere, Bradley Huffaker, kc claffy, Mark Allman, and Vern Paxson, Proceedings of the ACM Internet Measurement Conference, London, UK, November 2017.

RotorNet: A Scalable, Low-complexity, Optical Datacenter Network, William M. Mellette, Rob McGuinness, Arjun Roy, Alex Forencich, George Papen, Alex C. Snoeren, and George Porter, Proceedings of the ACM SIGCOMM Conference, Los Angeles, California, August 2017.

Backpage and Bitcoin: Uncovering Human Traffickers, Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, and Damon McCoy, Proceedings of the ACM SIGKDD Conference, Halifax, Nova Scotia, August 2017.

Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX, Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean Tullsen, Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

The buoyancy of castles: Examining the effectiveness of mitigations against floating-point timing channels, David Kohlbrenner and Hovav Shacham, Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

Dead Store Elimination (Stil) Considered Harmful, Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, and Kirill Levchenko, Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser, Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, and Nektarios Lentiadis, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2017.

Using Indirect Routing to Recover from Network Traffic Scheduling Estimation Error, Conglong Li, Matthew Mukerjee, David G. Andersen, Srinivasan Seshan, Michael Kaminsky, George Porter, and Alex C. Snoeren, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Beijing, China, May 2017.

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles, Mortiz Contag, Guo Li, Andre Pawlowski, Flexi Domke, Stefan Savage, Kirill Levchenko, and Thorsten Holz, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild, Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharamdasani, Haikuo Yin, Stevens LeBlond, Damon McCoy, and Kirill Levchenko, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

Finding and Preventing Bugs in JavaScript Bindings, Fraser Brown, Shravan Narayan, Riad S. Wahby, Dawson Engler, Ranjit Jhala, and Deian Stefan, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

How Do System Administrators Resolve Access-Denied Issues in the Real World?, Tianyin Xu, Han Min Naing, Le Lu, and Yuanyuan Zhou, Proceedings of the 35th Annual CHI Conference on Human Factors in Computing Systems (CHI'17), Denver, CO, USA, May 2017.

[All Publications]
Affiliations
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       Center for Wireless Communications (CWC)CWC        San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)
Sponsors