Time-division TCP for Reconfigurable Data Center Networks, Shawn Shuoshuo Chen, Weiyang Wang, Christopher Canel, Srinivasan Seshan, Alex C. Snoeren, and Peter Steenkiste,
Proceedings of the ACM SIGCOMM Conference, Amsterdamn, The Netherlands, August 2022.
Domain name lifetimes: Baseline and Threats, Raffaele Sommese, Gautam Akiwate, Stefan Savage, kc Claffy, Geoffrey M. Voelker, Alessia Botta, and Mattijs Jonker,
Proceedings of Network Traffic Measurement and Analysis Conference (TMA), June 2022.
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices, Hadi Givehchian, Nishant Bhaskar, Eliana Rodriguez Herrera, Héctor Rodrigo López Soto, Christian Dameff, Dinesh Bharadia, and Aaron Schulman,
Proceedings of the 43rd IEEE Symposium on Security and Privacy, May 2022.
FaaS Made Fast Using Snapshot-based VMs, Lixiang Ao, George Porter, and Geoffrey M. Voelker,
Proceedings of the 17th ACM European Conference on Computer Systems (EuroSys'22), Rennes, France, April 2022.
Quantifying Nations' Exposure to Traffic Observation and Selective Tampering, Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao, Bradley Huffaker, Alex C. Snoeren, and Alberto Dainottti,
Proceedings of the Passive and Active Measurement Conference (PAM), Virtual, March 2022.
IRR Hygiene In the RPKI Era, Ben Du, Gautam Akiwate, Thomas Krenc, Cecilia Testart, Alexander Marder, Bradley Huffaker, Alex C. Snoeren, and kc claffy,
Proceedings of the Passive and Active Measurement Conference (PAM), Virtual, March 2022.
Clio: A Hardware-Software Co-Designed Disaggregated Memory System, Zhiyuan Guo*, Yizhou Shan*, Xuhao Luo, Yutong Huang, and Yiying Zhang,
Proceedings of the 27th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'22), February 2022. (* co-first authors).
Risky BIZness: Risks Derived from Registrar Name Management, Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, and kc Claffy,
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Who's Got Your Mail? Characterizing Mail Service Provider Usage, Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Home is Where the Hijacking is: Understanding DNS Interception by Residential Routers, Audrey Randall, Enze Liu, Ramakrishna Padmanabhan, Gautam Akiwate, Geoffrey M. Voelker, Stefan Savage, and Aaron Schulman,
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Inferring Regional Access Network Topologies: Methods and Applications, Zesen Zhang, Alexander Marder, Ricky Mok, Bradley Huffaker, Matthew Luckie, kc Claffy, and Aaron Schulman,
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Federated Infrastructure: Use, Patterns, and Insights from "The People's Network", Dhananjay Jagtap, Alexander Yen, Huanlei Wu, Aaron Schulman, and Pat Pannuto,
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Identifying ASes of State-owned Internet operators, Esteban Carisimo, Alex Gamero-Garrido, Alex C. Snoeren, and Alberto Dainotti,
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Locked-In during Lock-Down: Undergraduate Life on the Internet in a Pandemic, Alisha Ukani, Ariana Mirian, and Alex C. Snoeren,
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure, Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, kc Claffy, and Anna Sperotto,
Proceedings of Network Traffic Measurement and Analysis Conference (TMA), September 2021. (Best Paper).
Hopper: Modeling and Detecting Lateral Movement, Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, and David Wagner,
Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns, Maximillian Golla, Grant Ho, Marika Lohmus, Monica Pulluri, and Elissa M. Redmiles,
Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
Jetset: Targeted Firmware Rehosting for Embedded Systems, Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, and Kirill Levchenko,
Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model, Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, and Xinxin Jin,
Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.