Understanding the Efficacy of Security Training in Practice, Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of the IEEE Symposium on Security and Privacy, May 2025.
Eden: Developer-Friendly Application-Integrated Far Memory, Anil Yelam, Stewart Grant, Saarth Deshpande, Nadav Amit, Radhika Niranjan Mysore, Amy Ousterhout, Marcos K. Aguilera, and Alex C. Snoeren,
Proceedings of the 22nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Philadelphia, PA, April 2025.
Sublet Your Subnet: Inferring IP Leasing in the Wild, Ben Du, Romain Fontugne, Cecilia Testart, Alex C. Snoeren, and kc Claffy,
Proceedings of the ACM Internet Measurement Conference (IMC), Madrid, Spain, November 2024.
Give and Take: An End-To-End Investigation of Giveaway Scam
Conversion Rates, Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, and Sarah Meiklejohn,
Proceedings of the ACM Internet Measurement Conference (IMC), Madrid, Spain, November 2024.
Realizing RotorNet: Toward Practical Microsecond Scale Optical Networking, William M. Mellette, Alex Forencich, Rukshani Athapathu, Alex C. Snoeren, George Papen, and George Porter,
Proceedings of the ACM SIGCOMM Conference, Sydney, Australia, August 2024.
Prudentia: Findings of an Internet Fairness Watchdog, Adithya Abraham Philip, Rukshani Athapathu, Ranysha Ware, Fabian Francis Mkocheko, Alexis Schlomer, Mengrou Shou, Zili Meng, Srinivasan Seshan, and Justine Sherry,
Proceedings of the ACM SIGCOMM Conference, Sydney, Australia, August 2024.
DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency, Haoran Ma, Yifan Qiao, Shi Liu, Shan Yu, Yuanjiang Ni, Qingda Lu, Jiesheng Wu, Yiying Zhang, Miryung Kim, and Harry Xu,
Proceedings of the 18th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Santa Clara, CA, USA, July 2024.
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild, Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, and Liz Izhikevich,
Proceedings of the IEEE European Symposium on Security and Privacy, Vienna, Austria, July 2024.
Unfiltered: Measuring Cloud-based Email Filtering Bypasses, Sumanth Rao, Enze Liu, Grant Ho, Geoffrey M. Voelker, and Stefan Savage,
Proceedings of the Web Conference (WWW), Singapore, May 2024.
The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior, Asuman Senol, Alisha Ukani, Dylan Cutler, and Igor Bilogrevic,
Proceedings of the Web Conference (WWW), Singapore, May 2024.
Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices, Hadi Givehchian, Nishant Bhaskar, Alexender Redding, Han Zhao, Aaron Schulman, and Dinesh Bharadia,
Proceedings of the IEEE Symposium on Security and Privacy, May 2024.
Effective Bug Detection with Unused Definitions, Li Zhong, Chengcheng Xiang, Haochen Huang, Bingyu Shen, Eric Mugnier, and Yuanyuan Zhou,
Proceedings of the ACM European Conference on Computer Systems (EuroSys), Athens, Greece, April 2024.
SuperNIC: An FPGA-Based, Cloud-Oriented SmartNIC, Will Lin, Yizhou Shan, Ryan Kosta, Arvind Krishnamurthy, and Yiying Zhang,
Proceedings of the 32nd ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Montery, CA, USA, March 2024. (Best Paper Runner-Up).
Network Topology Facilitates Internet Traffic Control in Autocracies, Eda Keremoğlu, Nils B. Weidmann, Alexander Gamero-Garrido, Esteban Carisimo, Alberto Dainotti, and Alex C. Snoeren,
PNAS Nexus 3(3), March 2024.
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates, Ariana Mirian, Grant Ho, Stefan Savage, and Geoffrey M. Voelker,
Proceedings of Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 2023.