Systems and Networking Publications
2024 │ 2023 │ 2022 │ 2021 │ 2020 │ 2019 │ 2018 │ 2017 │ 2016 │ 2015 │ 2014 │ 2013 │ 2012
2011 │ 2010 │ 2009 │ 2008 │ 2007 │ 2006 │ 2005 │ 2004 │ 2003 │ 2002 │ 2001 │ 2000 │ 1999
2024

Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild, Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, and Liz Izhikevich, Proceedings of the IEEE European Symposium on Security and Privacy, Vienna, Austria, July 2024.

Unfiltered: Measuring Cloud-based Email Filtering Bypasses, Sumanth Rao, Enze Liu, Grant Ho, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the Web Conference (WWW), Singapore, May 2024.

The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior, Asuman Senol, Alisha Ukani, Dylan Cutler, and Igor Bilogrevic, Proceedings of the Web Conference (WWW), Singapore, May 2024.

Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices, Hadi Givehchian, Nishant Bhaskar, Alexender Redding, Han Zhao, Aaron Schulman, and Dinesh Bharadia, Proceedings of the IEEE Symposium on Security and Privacy, May 2024.

Network Topology Facilitates Internet Traffic Control in Autocracies, Eda Keremoğlu, Nils B. Weidmann, Alexander Gamero-Garrido, Esteban Carisimo, Alberto Dainotti, and Alex C. Snoeren, PNAS Nexus 3(3), March 2024.

2023

An Empirical Analysis of Enterprise-Wide Mandatory Password Updates, Ariana Mirian, Grant Ho, Stefan Savage, and Geoffrey M. Voelker, Proceedings of Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 2023.

IRRegularities in the Internet Routing Registry, Ben Du, Katherine Izhikevich, Sumanth Rao, Cecilia Testart, Gautam Akiwate, Alex C. Snoeren, and kc Claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Montreal, Canada, October 2023.

Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking, Deepti Raghavan, Shreya Ravi, Gina Yuan, Pratiksha Thaker, Sanjari Srivastava, Micah Murray, Pedro Henrique Penna, Amy Ousterhout, Philip Levis, Matei Zaharia, and Irene Zhang, Proceedings of the 29th ACM Symposium on Operating Systems Principles (SOSP), Koblenz, Germany, October 2023.

Mira: A Program-Behavior-Guided Far Memory System, Zhiyuan Guo, Zijian He, and Yiying Zhang, Proceedings of the 29th ACM Symposium on Operating Systems Principles (SOSP), Koblenz, Germany, October 2023.

A Cloud-Scale Characterization of Remote Procedure Calls, Korakit Seemakhupt, Brent E. Stephens, Samira Khan, Sihang Liu, Hassan Wassel, Soheil Hassas Yeganeh, Alex C. Snoeren, Arvind Krishnamurthy, David Culler, and Hank M. Levy, Proceedings of the 29th ACM Symposium on Operating Systems Principles (SOSP), Koblenz, Germany, October 2023.

Limited Access: The Truth Behind Far Memory, Anil Yelam, Stewart Grant, Enze Liu, Radhika Niranjan Mysore, Marcos K. Aguilera, Amy Ousterhout, and Alex C. Snoeren, Proceedings of the Workshop on Resource Disaggregation and Serverless Computing (WORDS), October 2023.

Crescendo: Towards Real-time, Wide-band, High-fidelity Spectrum Sensing Systems, Raghav Subbaraman, Kevin Mills, Aaron Schulman, and Dinesh Bharadia, Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), Madrid, Spain, October 2023.

Memory Management in ActiveRMT: Towards Runtime-programmable Switches, Rajdeep Das and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Conference, New York, NY, September 2023. (Best paper award).

Destination Unreachable: Characterizing Internet Outages and Shutdowns, Zachary S. Bischof, Kennedy Pitcher, Esteban Carisimo, Amanda Meng, Rafael Bezerra Nunes, Ramakrishna Padmanabhan, Margaret E. Roberts, Alex C. Snoeren, and Alberto Dainotti, Proceedings of the ACM SIGCOMM Conference, New York, NY, September 2023.

Access Denied: Assessing Physical Risks to Internet Access Networks, Alexander Marder, Zesen Zhang, Ricky Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, and Aaron Schulman, Proceedings of the 31st USENIX Security Symposium, Anaheim, CA, August 2023.

Improving Logging to Reduce Permission Over-Granting Mistakes, Bingyu Shen, Tianyi Shan, and Yuanyuan Zhou, Proceedings of the 31st USENIX Security Symposium, Anaheim, CA, August 2023.

MultiView: Finding Blind Spots in Access-Deny Issues, Bingyu Shen, Tianyi Shan, and Yuanyuan Zhou, Proceedings of the 31st USENIX Security Symposium, Anaheim, CA, August 2023.

Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender, Enze Liu, Lu Sun, Alex Bellon, Grant Ho, Stefan Savage, Geoffrey M. Voelker, and Imani N. S. Munyaka, Proceedings of the Symposium on Useable Privacy and Security, Anaheim, CA, August 2023.

In the Line of Fire: Risks of DPI-triggered Data Collection, Ariana Mirian, Alisha Ukani, Ian Foster, Gautam Akiwate, Taner Halicioglu, Cindy Moore, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), Marina del Rey, CA, August 2023.

No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps, Enze Liu, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, and Damon McCoy, Proceedings of the 23rd Privacy Enhancing Technologies Symposium, Lausanne, Switzerland, July 2023.

Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy, Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE European Symposium on Security and Privacy, Delft, The Netherlands, July 2023, pages 373-391. (Best paper award).

Out of Hand for Hardware? Within Reach for Software!, Zhihong Luo, Silvery Fu, Emmanuel Amaro, Amy Ousterhout, Sylvia Ratnasamy, and Scott Shenker, Proceedings of the 19th ACM Workshop on Hot Topics in Operating Systems (HotOS-XIX), Providence, RI, June 2023.

Make It Real: An End-to-End Implementation of A Physically Disaggregated Data Center, Yiying Zhang, ACM SIGOPS Operating Systems Review 57(1):1-9, 2023.

WaVe: a Verifiably Secure WebAssembly Sandboxing Runtime, Evan Johnson, Evan Laufer, Zijie Zhao, Shravan Narayan, Stefan Savage, Deian Stefan, and Fraser Brown, Proceedings of the IEEE Symposium on Security and Privacy, May 2023. (Distinguished Paper Award).

Ransomware Attack Associated With Disruptions at Adjacent Emergency Departments in the US, Christian Dameff, Jeffrey Tully, Theodore C. Chan, Edward M. Castillo, Stefan Savage, Patricia Maysent, Thomas M. Hemmen, Brian J. Clay, and Christopher A. Longhurst, JAMA Network Open 6(5):e2312270-e2312270, 2023.

Disaggregating Stateful Network Functions, Deepak Bansal, Gerald DeGrace, Rishabh Tewari, Michal Zygmunt, James Grantham, Silvano Gai, Mario Baldi, Krishna Doddapaneni, Arun Selvarajan, Arunkumar Arumugam, Balakrishnan Raman, Avijit Gupta, Sachin Jain, Deven Jagasia, Evan Langlais, Pranjal Srivastava, Rishiraj Hazarika, Neeraj Motwani, Soumya Tiwari, Stewart Grant, Ranveer Chandra, and Srikanth Kandula, Proceedings of the 17th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2023.

Canvas: Isolated and Adaptive Swapping for Multi-Applications on Remote Memory, Chenxi Wang, Yifan Qiao, Haoran Ma, Shi Liu, Yiying Zhang, Wenguang Chen, Ravi Netravali, Miryung Kim, and Harry Xu, Proceedings of the 17th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2023.

Hermit: Low-Latency, High-Throughput, and Transparent Remote Memory via Feedback-Directed Asynchrony, Yifan Qiao, Chenxi Wang, Zhenyuan Ruan, Adam Belay, Qingda Lu, Yiying Zhang, Miryung Kim, and Harry Xu, Proceedings of the 17th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2023.

Rosebud: Making FPGA-accelerated Middlebox Development More Pleasant, Moein Khazraee, Alex Forencich, George C. Papen, Alex C. Snoeren, and Aaron Schulman, Proceedings of the 28th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Vancouver, Canada, March 2023.

TagAlong: Free, Wide-Area Data-Muling and Services, Alex Bellon, Alex Yen, and Pat Pannuto, Proceedings of International Workshop on Mobile Computing Systems and Applications (HotMobile), Newport Beach, CA, 2023.

Protecting Data Integrity of Web Applications with Database Constraints Inferred from Application Code, Haochen Huang, Bingyu Shen, Li Zhong, and Yuanyuan Zhou, Proceedings of the 28th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Vancouver, Canada, March 2023.

A metric for factoring data movement into chasing the sun, Yibo Guo and George Porter, Proceedings of the 1st Workshop on NetZero Carbon Computing (NetZero'23), Montreal, Canada, February 2023.

Zed: Leveraging Data Types to Process Eclectic Data, Amy Ousterhout, Steve McCanne, Henri Dubois-Ferriere, Silvery Fu, Sylvia Ratnasamy, and Noah Treuhaft, Proceedings of the 13th Annual Conference on Innovative Data Systems Research (CIDR), Amsterdam, The Netherlands, January 2023.

2022

Scaling beyond packet switch limits with multiple dataplanes, Yibo Guo, William M. Mellette, Alex C. Snoeren, and George Porter, Proceedings of ACM CoNEXT, Rome, Italy, December 2022.

The Challenges of Blockchain-based Naming Systems for Malware Defenders, Audrey Randall, Wes Hardaker, Aaron Schulman, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), November 2022, pages 1-14. (Best Student Paper).

Retroactive Identification of Targeted DNS Infrastructure Hijacking, Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc Claffy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 14-32.

Where .ru? Assessing the Impact of Conflict on Russian Domain Infrastructure, Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc Claffy, Alessio Botta, Geoffrey M. Voelker, Rolan van Rijswijk-Deij, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 159-165.

Measuring UID Smuggling in the Wild, Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, and Aaron Schulman, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022, pages 230-243.

Stop, DROP, and ROA: Effectiveness of Defenses through the lens of DROP, Leo Oliver, Gautam Akiwate, Matthew Luckie, Ben Du, and kc Claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022.

ZDNS: A Fast DNS Toolkit for Internet Measurement, Liz Izhikevich, Gautam Akiwate, Briana Berger, Spencer Drakontaidis, Anna Ascheman, Paul Pearce, David Adrian, and Zakir Durumeric, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022.

Mind Your MANRS: Measuring the MANRS Ecosystem, Ben Du, Cecilia Testart, Romain Fontugne, Gautam Akiwate, Alex C. Snoeren, and kc Claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Nice, France, October 2022.

Measuring Security Practices, Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, and Stefan Savage, Communications of the Association for Computing Machinery 65(9):93-102, September 2022.

Towards a Fully Disaggregated and Programmable Data Center, Yizhou Shan, Will Lin, Zhiyuan Guo, and Yiying Zhang, Proceedings of the 13th ACM Asia-Pacific Workshop on Systems (APSys'22), San Diego, Calif., August 2022.

Time-division TCP for Reconfigurable Data Center Networks, Shawn Shuoshuo Chen, Weiyang Wang, Christopher Canel, Srinivasan Seshan, Alex C. Snoeren, and Peter Steenkiste, Proceedings of the ACM SIGCOMM Conference, Amsterdam, The Netherlands, August 2022. (The first two authors contributed equally).

Something Old, Something New: Extending the Life of CPUs in Datacenters, Amanda Tomlinson and George Porter, Proceedings of the 1st Workshop on Sustainable Computer Systems Design and Implementation (HotCarbon'22), San Diego, Calif., July 2022.

Telling the Story of Climate, Sustainability, and Modern Computing to the General Public, Soroya Rowley, George Porter, and Monica Stufft, The Second ACM SIGEnergy Workshop on Society, Climate, and Sustainability (WeCan'22), June 2022.

Domain Name Lifetimes: Baseline and Threats, Antonia Affinito, Raffaele Sommese, Gautam Akiwate, Stefan Savage, KC Claffy, Geoffrey M. Voelker, Alessio Botta, and Mattijs Jonker, Proceedings of the 6th Network Traffic Measurement and Analysis Conference (TMA), June 2022, pages 10-18.

Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices, Hadi Givehchian, Nishant Bhaskar, Eliana Rodriguez Herrera, Héctor Rodrigo López Soto, Christian Dameff, Dinesh Bharadia, and Aaron Schulman, Proceedings of the 43rd IEEE Symposium on Security and Privacy, May 2022.

FaaS Made Fast Using Snapshot-based VMs, Lixiang Ao, George Porter, and Geoffrey M. Voelker, Proceedings of the 17th ACM European Conference on Computer Systems (EuroSys'22), Rennes, France, April 2022, pages 730-746.

Quantifying Nations' Exposure to Traffic Observation and Selective Tampering, Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao, Bradley Huffaker, Alex C. Snoeren, and Alberto Dainottti, Proceedings of the 23rd Passive and Active Measurement Conference (PAM), Virtual, March 2022.

IRR Hygiene In the RPKI Era, Ben Du, Gautam Akiwate, Thomas Krenc, Cecilia Testart, Alexander Marder, Bradley Huffaker, Alex C. Snoeren, and kc claffy, Proceedings of the 23rd Passive and Active Measurement Conference (PAM), Virtual, March 2022.

Clio: A Hardware-Software Co-Designed Disaggregated Memory System, Zhiyuan Guo*, Yizhou Shan*, Xuhao Luo, Yutong Huang, and Yiying Zhang, Proceedings of the 27th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'22), February 2022. (* co-first authors).

2021

Risky BIZness: Risks Derived from Registrar Name Management, Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, and kc Claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 673-686. (IRTF Applied Networking Research Prize).

Who's Got Your Mail? Characterizing Mail Service Provider Usage, Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 122-136.

Home is Where the Hijacking is: Understanding DNS Interception by Residential Routers, Audrey Randall, Enze Liu, Ramakrishna Padmanabhan, Gautam Akiwate, Geoffrey M. Voelker, Stefan Savage, and Aaron Schulman, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021, pages 390-397.

Inferring Regional Access Network Topologies: Methods and Applications, Zesen Zhang, Alexander Marder, Ricky Mok, Bradley Huffaker, Matthew Luckie, kc Claffy, and Aaron Schulman, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.

Federated Infrastructure: Use, Patterns, and Insights from "The People's Network", Dhananjay Jagtap, Alexander Yen, Huanlei Wu, Aaron Schulman, and Pat Pannuto, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.

Identifying ASes of State-owned Internet operators, Esteban Carisimo, Alex Gamero-Garrido, Alex C. Snoeren, and Alberto Dainotti, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.

Locked-In during Lock-Down: Undergraduate Life on the Internet in a Pandemic, Alisha Ukani, Ariana Mirian, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), Virtual, November 2021.

Characterization of Anycast Adoption in the DNS Authoritative Infrastructure, Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, kc Claffy, and Anna Sperotto, Proceedings of the 5th Network Traffic Measurement and Analysis Conference (TMA), September 2021, pages 1-9. (Best Paper).

Hopper: Modeling and Detecting Lateral Movement, Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, and David Wagner, Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021, pages 3093-3110.

Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns, Maximillian Golla, Grant Ho, Marika Lohmus, Monica Pulluri, and Elissa M. Redmiles, Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.

Jetset: Targeted Firmware Rehosting for Embedded Systems, Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, and Kirill Levchenko, Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.

Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model, Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, and Xinxin Jin, Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.

PYLIVE: On-the-Fly Code Change for Python-based Online Services, Haochen Huang, Chengcheng Xiang, Li Zhong, and Yuanyuan Zhou, Proceedings of the USENIX Annual Technical Conference, July 2021. (The first two authors contributed equally).

How new kinds of computer networks can reduce the environmental impact of cloud computing , George Porter, The First ACM SIGEnergy Workshop on Climate, Sustainability, and Society (ACM e-Energy 2021), Online event, June 2021.

Stipulated Smartphones for Students: The Requirements of Modern Technology for Academia, Rob McGuinness and George Porter, ACM Seventh Workshop on Computing within Limits (LIMITS'21), Online event, June 2021.

User-Defined Cloud, Yiying Zhang, Ardalan Amiri Sani, and Harry Xu, Proceedings of the 18th ACM Workshop on Hot Topics in Operating Systems (HotOS-XVIII), Online Event, June 2021.

Century-Scale Smart Infrastructure, Dhananjay Jagtap, Nishant Bhaskar, and Pat Pannuto, Proceedings of the 18th ACM Workshop on Hot Topics in Operating Systems (HotOS-XVIII), Online Event, June 2021.

In-network Contention Resolution for Disaggregated Memory, Stewart Grant and Alex C. Snoeren, Proceedings of the Workshop on Resource Disaggregation and Serverless Computing (WORDS), April 2021.

CoResident Evil: Covert Communications in the Cloud with Lambdas, Anil Yelam, Ariana Mirian, Keerthana Ganesan, Shibani Subbareddy, and Stefan Savage, Proceedings of the Web Conference (WWW), Ljubljana, Solvenia, April 2021.

Clairvoyance: Inferring Blocklist Use on the Internet, Vector Guo Li, Gautam Akiwate, Kirill Levchenko, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 22nd Passive and Active Measurement Conference (PAM), Brandenburg, Germany, March 2021, pages 57-75.

Inferring Cloud Interconnections: Validation, Geolocation, and Routing Behavior, Alex Marder, kc claffy, and Alex C. Snoeren, Proceedings of the 22nd Passive and Active Measurement Conference (PAM), Brandenburg, Germany, March 2021.

Доверя́й, но проверя́й: SFI safety for native-compiled Wasm, Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, and Deian Stefan, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2021.

2020

Optical networking within the Lightwave Energy-Efficient Datacenter project (Invited), William M. Mellette, Alex Forencich, Jason Kelley, Joseph Ford, George Porter, Alex C. Snoeren, and George Papen, J. Opt. Commun. Netw. 12(12):378-389, December 2020.

LevelUp: A thin-cloud approach to game livestreaming, Landon P. Cox and Lixiang Ao, Proceedings of the Fifth ACM/IEEE Symposium on Edge Computing, Virtual Event, November 2020.

Enabling Active Networking on RMT Hardware, Rajdeep Das and Alex C. Snoeren, Proceedings of the 19th ACM Workshop on Hot Topics in Networks (HotNets-XIX), Chicago, IL, November 2020.

Unresolved Issues: Prevalence, Persistence and Perils of Lame Nameservers, Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Ian Foster, Stefan Savage, Geoffrey M. Voelker, and kc Claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020, pages 281-294.

Trufflehunter: Cache Sniffing Rare Domains at Large Public DNS Resolvers, Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Stefan Savage, Geoffrey M. Voelker, and Aaron Schulman, Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020, pages 50-64. (IRTF Applied Networking Research Prize).

MAnycast2 -- Using Anycast to Measure Anycast: Challenges and Opportunities, Raffaele Sommese, Gautam Akiwate, Leandro Bertholdo, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, KC Claffy, and Anna Sperotto, Proceedings of the ACM Internet Measurement Conference (IMC), Pittsburgh, Pennsylvania (via the Internet), October 2020.

Particle: Ephemeral Endpoints for Serverless Networking, Shelby Thomas, Lixiang Ao, Geoffrey M. Voelker, and George Porter, Proceedings of the 11th ACM Symposium on Cloud Computing (SOCC), October 2020, pages 16-29.

SmartNIC Performance Isolation with FairNIC: Programmable Networking for the Cloud, Stewart Grant, Anil Yelam, Maxwell Bland, and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Conference, Virtual, August 2020. (The first two authors contributed equally).

PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations, Chengcheng Xiang, Haochen Huang, Andrew Yoo, Yuanyuan Zhou, and Shankar Pasupathy, Proceedings of the USENIX Annual Technical Conference, July 2020.

Disaggregating Persistent Memory and Controlling Them Remotely: An Exploration of Passive Disaggregated Key-Value Stores, Shin-Yeh Tsai, Yizhou Shan, and Yiying Zhang, Proceedings of the USENIX Annual Technical Conference, July 2020.

Understanding Memory and Thread Safety Practices and Issues in Real-World Rust Programs, Boqin Qin, Yilun Chen, Zeming Yu, Linhai Song, and Yiying Zhang, Proceedings of Programming Languages Design and Implementation (PLDI), June 2020. (The first two authors contributed equally).

Corundum: An Open-Source 100-Gbps NIC, Alex Forencich, Alex C. Snoeren, George Porter, and George Papen, Proceedings of the 28th IEEE International Symposium On Field-Programmable Custom Computing Machines (FCCM), Fayetteville, AR, May 2020.

Dark Matter: Uncovering the DarkComet RAT Ecosystem, Brown Farinholt, Mohammad Rezaeirad, Damon McCoy, and Kirill Levchenko, Proceedings of The Web Conference (WWW), Taipei, Taiwan, April 2020.

RIPE IPmap Active Geolocation: Mechanism and Performance Evaluation, Ben Du, Massimo Candela, Bradley Huffaker, Alex C. Snoeren, and kc claffy, ACM SIGCOMM Computer Communication Review 50(2), April 2020.

Expanding Across Time to Deliver Bandwidth Efficiency and Low Latency, William M. Mellette, Rajdeep Das, Yibo Guo, Rob McGuinness, Alex C. Snoeren, and George Porter, Proceedings of the 17th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Santa Clara, CA, February 2020.

Adapting TCP for Reconfigurable Datacenter Networks, Matthew Mukerjee, Christopher Canel, Weiyang Wang, Daehyeok Kim, Srinivasan Seshan, and Alex C. Snoeren, Proceedings of the 17th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Santa Clara, CA, February 2020.

2019

Hack for Hire, Ariana Mirian, Communications of the Association for Computing Machinery 62(12):32-37, December 2019.

Towards Continuous Access Control Validation and Forensics, Chengcheng Xiang, Yudong Wu, Bingyu Shen, Mingyao Shen, Haochen Huang, Tianyin Xu, Yuanyuan Zhou, Cindy Moore, Xinxin Jin, and Tianwei Sheng, Proceedings of the ACM Conference on Computer and Communications Security (CCS), London, UK, November 2019.

Hack for Hire: Investigating the Black Market of Retail Email Account Hacking Services, Ariana Mirian, ACM Queue: Tomorrow's Computing Today 17(4), October 2019.

Understanding the Limits of Passive Realtime Datacenter Fault Detection and Localization, Arjun Roy, Rajdeep Das, Hongyi Zeng, Jasmeet Bagga, and Alex C. Snoeren, IEEE/ACM Transactions on Networking 27(5), October 2019.

Always on Stress: The Emotive Impact of Anytime, Anywhere Discussion Boards, Megan Bardolph, George Porter, Paul Hadjipieris, and Jace Hargis, Transformative Dialogues: Teaching and Learning Journal 12(2), 2019.

Measuring Security Practices and How They Impact Security, Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Amsterdam, The Netherlands, October 2019, pages 36-49.

Detecting if LTE is the Bottleneck with BurstTracker, Arjun Balasingam, Manu Bansal, Rakesh Misra, Kanthi Nagaraj, Rahul Tandra, Sachin Katti, and Aaron Schulman, Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), Los Cabos, Mexico, October 2019.

Residential Links Under the Weather, Ramakrishna Padmanabhan, Aaron Schulman, Dave Levin, and Neil Spring, Proceedings of the ACM SIGCOMM Conference, Beijing, China, August 2019.

Triton: A Software-Reconfigurable Federated Avionics Testbed, Sam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, and Kirill Levchenko, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), Santa Clara, CA, August 2019.

Pythia: Remote Oracles for the Masses, Shin-Yeh Tsai, Mathias Payer, and Yiying Zhang, Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019.

Detecting and Characterizing Lateral Phishing at Scale, Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, and David Wagner, Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019, pages 1273-1290. (Distinguished paper).

Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence, Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko, Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019, pages 851-867.

"Please Pay Inside": Evaluating Bluetooth-based Detection of Gas Pump Skimmers, Nishant Bhaskar, Maxwell Bland, Kirill Levchenko, and Aaron Schulman, Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, August 2019.

Learned Operating Systems, Yiying Zhang and Yutong Huang, ACM SIGOPS Operating Systems Review 53(1):40-45, July 2019.

Ariadne: Online Provenance for Big Graph Analytics, Vicky Papavasileiou, Ken Yocum, and Alin Deutsch, Proceedings of the ACM SIGMOD/PODS International Conference on Management of Data, Amsterdam, The Netherlands, July 2019.

A Double-Edged Sword: Security Threats and Opportunities in One-Sided Network Communication, Shin-Yeh Tsai and Yiying Zhang, Proceedings of the 11th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), Renton, WA, July 2019.

Storm: A Fast Transactional Dataplane for Remote Data Structures, Stanko Novakovic, Yizhou Shan, Aasheesh Kolli, Michael Cui, Yiying Zhang, Haggai Eran, Liran Liss, Michael Wei, Dan Tsafrir, and Marcos Aguilera, Proceedings of the 12th ACM International Systems and Storage Conference (SYSTOR), Haifa, Israel, June 2019. (Award paper).

SparSDR: Sparsity-proportional Backhaul and Compute for SDRs, Moein Khazraee, Yeswanth Guddeti, Sam Crow, Alex C. Snoeren, Kirill Levchenko, Dinesh Bharadia, and Aaron Schulman, Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Seoul, Korea, June 2019.

Web Feature Deprecation: A Case Study for Chrome, Ariana Mirian, Nikunj Bhagat, Caitlin Sadowski, Adrienne Porter Felt, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 41st ACM/IEEE International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP) 2019, Montréal, QC, Canada, May 2019, pages 302-311.

Hack for Hire: Exploring the Emerging Market for Account Hijacking, Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, and Kurt Thomas, Proceedings of the Web Conference (WWW), San Francisco, CA, May 2019, pages 1279-1289.

Understanding Real-World Concurrency Bugs in Go, Tengfei Tu, Xiaoyu Liu, Linhai Song, and Yiying Zhang, Proceedings of the 24th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, RI, April 2019. (The first two authors contributed equally).

How to Find Correlated Internet Failures, Ramakrishna Padmanabhan, Aaron Schulman, Alberto Dainotti, Dave Levin, and Neil Spring, Proceedings of the Passive and Active Measurement Conference (PAM), Puerto Varas, Chile, March 2019.

LEED: A Lightwave Energy-Efficient Datacenter, Y. Shaya Fainman, Joseph Ford, William M. Mellette, Shayan Mookherjea, George Porter, Alex C. Snoeren, George Papen, Saman Saeedi, John Cunningham, Ashok Krishnamoorthy, Michael Gehl, Christopher T. DeRose, Paul S. Davids, Douglas C. Trotter, Andrew L. Starbuck, Christina M. Dallo, Dana Hood, Andrew Pomerene, and Anthony Lentine, Proceedings of OFC/NFOEC, San Diego, CA, March 2019.

SweepSense: Sensing 5 GHz in 5 Milliseconds with Low-cost SDRs, Yeswanth Guddeti, Raghav Subbaraman, Moein Khazraee, Aaron Schulman, and Dinesh Bharadia, Proceedings of the 16th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, February 2019.

2018

Schrodinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem, Mohammad Rezaeirad, Brown Farinholt, Paul Pearce, Kirill Levchenko, and Damon McCoy, Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, August 2018.

LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation, Yizhou Shan, Yutong Huang, Yilun Chen, and Yiying Zhang, Proceedings of the 13th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Carlsbad, CA, October 2018. (Award paper).

An Empirical Analysis of the Commercial VPN Ecosystem, Mohammad Taha Khan, Joe DeBlasio, Chris Kanich, Geoffrey M. Voelker, Alex C. Snoeren, and Narseo Vallina-Rodriguez, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018, pages 443-456.

Following Their Footsteps: Characterizing Account Automation Abuse and Defenses, Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, and Nektarios Leontiadis, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018, pages 43-55.

Cloud Datacenter SDN Monitoring: Experiences and Challenges, Arjun Roy, Deepak Bansal, David Brumley, Harish Kumar Chandrappa, Parag Sharma, Rishabh Tewari, Behnaz Arzani, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, October 2018.

Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion, Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, October 2018.

Sprocket: A Serverless Video Processing Framework, Lixiang Ao, Liz Izhikevich, Geoffrey M. Voelker, and George Porter, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Carlsbad, CA, October 2018, pages 263-274.

Inferring Persistent Interdomain Congestion, Amogh Dhamdhere, David D. Clark, Alexander Gamero-Garrido, Matthew Luckie, Ricky K. P. Mok, Gautam Akiwate, Kabir Gogia, Vaibhav Bajpai, Alex C. Snoeren, and kc claffy, Proceedings of the ACM SIGCOMM Conference, Budapest, Hungary, August 2018. (Best Paper).

Evaluating the Performance of Software NICs for 100-Gb/s Datacenter Traffic Control, Rob McGuinness and George Porter, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Ithaca, New York, July 2018.

Dark Packets and the end of Network Scaling, Shelby Thomas, Rob McGuinness, Geoffrey M. Voelker, and George Porter, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Ithaca, New York, July 2018, pages 1-14.

CacheCloud: Towards Speed-of-Light Datacenter Communication, Shelby Thomas, Geoffrey M. Voelker, and George Porter, Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud-X), Boston, MA, July 2018.

Toward Optical Switching in the Data Center, William M. Mellette, Alex C. Snoeren, and George Porter, IEEE International Conference on High Performance Switching and Routing, Bucharest, Romania, June 2018.

Tracking Ransomware End-to-end, Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, and Damon McCoy, Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, May 2018.

Distributed Shared Persistent Memory, Yizhou Shan, Shin-Yeh Tsai, and Yiying Zhang, Proceedings of the 9th Annual Non-Volatile Memories Workshop (NVMW), San Diego, CA, March 2018.

Estimating Profitability of Alternative Cryptocurrencies, Danny Yuxing Huang, Kirill Levchenko, and Alex C. Snoeren, Proceedings of the International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curacao, February 2018.

2017

Passive Realtime Datacenter Fault Detection and Localization, Arjun Roy, Hongyi Zeng, Jasmeet Bagga, and Alex C. Snoeren, USENIX ;login: 42(3), 2017.

Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research, Alex Gamero-Garrido, Stefan Savage, Kirill Levchenko, and Alex C. Snoeren, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, November 2017.

Tripwire: Inferring Internet Site Compromise, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017, pages 341-354.

Exploring the Dynamics of Search Advertiser Fraud, Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017, pages 157-170.

PacketLab: A Universal Measurement Endpoint Interface, Kirill Levchenko, Amogh Dhamdhere, Bradley Huffaker, kc claffy, Mark Allman, and Vern Paxson, Proceedings of the ACM Internet Measurement Conference (IMC), London, UK, November 2017.

Log20: Fully Automated Optimal Placement of Log Printing Statements under Specified Overhead Threshold, Xu Zhao, Kirk Rodrigues, Yu Luo, Michael Stumm, Ding Yuan, and Yuanyuan Zhou, Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, October 2017.

LITE Kernel RDMA Support for Datacenter Applications, Shin-Yeh Tsai and Yiying Zhang, Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, October 2017.

Distributed Shared Persistent Memory, Yizhou Shan, Shin-Yeh Tsai, and Yiying Zhang, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Santa Clara, CA, September 2017.

Disaggregated Operating System, Yiying Zhang, Yizhou Shan, and Sumukh Hallymysore, Proceedings of the 17th International Workshop on High Performance Transaction Systems (HPTS), October 2017.

RotorNet: A Scalable, Low-complexity, Optical Datacenter Network, William M. Mellette, Rob McGuinness, Arjun Roy, Alex Forencich, George Papen, Alex C. Snoeren, and George Porter, Proceedings of the ACM SIGCOMM Conference, Los Angeles, CA, August 2017.

Backpage and Bitcoin: Uncovering Human Traffickers, Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, and Damon McCoy, Proceedings of the ACM SIGKDD Conference, Halifax, Nova Scotia, August 2017.

Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX, Craig Disselkoen, David Kohlbrenner, Leo Porter, and Dean Tullsen, Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

On the Effectiveness of Mitigations against Floating-point Timing channels, David Kohlbrenner and Hovav Shacham, Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

Dead Store Elimination (Still) Considered Harmful, Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, and Kirill Levchenko, Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 2017.

Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser, Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, and Nektarios Leontiadis, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2017.

Using Indirect Routing to Recover from Network Traffic Scheduling Estimation Error, Conglong Li, Matthew Mukerjee, David G. Andersen, Srinivasan Seshan, Michael Kaminsky, George Porter, and Alex C. Snoeren, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Beijing, China, May 2017.

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles, Mortiz Contag, Guo Li, Andre Pawlowski, Felix Domke, Stefan Savage, Kirill Levchenko, and Thorsten Holz, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild, Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharamdasani, Haikuo Yin, Stevens LeBlond, Damon McCoy, and Kirill Levchenko, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

Finding and Preventing Bugs in JavaScript Bindings, Fraser Brown, Shravan Narayan, Riad S. Wahby, Dawson Engler, Ranjit Jhala, and Deian Stefan, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2017.

How Do System Administrators Resolve Access-Denied Issues in the Real World?, Tianyin Xu, Han Min Naing, Le Lu, and Yuanyuan Zhou, Proceedings of the 35th Annual CHI Conference on Human Factors in Computing Systems (CHI'17), Denver, CO, USA, May 2017.

Pinning Down Abuse on Google Maps, Danny Yuxing Huang, Doug Grundman, Kurt Thomas, Elie Bursztein, Abhishek Kumar, Kirill Levchenko, and Alex C. Snoeren, Proceedings of the International World Wide Web Conference (WWW), Perth, Australia, April 2017.

Tools for Automated Analysis of Cybercriminal Markets, Rebecca S Portnoff, Sadia Afroz, Greg Durrett, Jonathan K Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko, and Vern Paxson, Proceedings of the International World Wide Web Conference (WWW), Perth, Australia, April 2017.

Passive Realtime Datacenter Fault Detection and Localization, Arjun Roy, Hongyi Zeng, Jasmeet Bagga, and Alex C. Snoeren, Proceedings of the 14th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2017.

Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads, Sadjad Fouladi, Riad S. Wahby, Brennan Shacklett, Karthikeyan Vasuki Balasubramaniam, William Zeng, Rahul Bhalerao, Anirudh Sivaraman, George Porter, and Keith Winstein, Proceedings of the 14th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2017.

Enabling Wide-spread Communications on Optical Fabric with MegaSwitch, Li Chen, Kai Chen, Joshua Zhu, Minlan Yu, George Porter, Chunming Qiao, and Shan Zhong, Proceedings of the 14th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2017.

FarmBeats: An IoT Platform for Data-Driven Agriculture, Deepak Vasisht, Zerina Kapetanovic, Jongho Won, Xinxin Jin, Ranveer Chandra, Sudipta Sinha, Ashish Kapoor, Madhusudhan Gumbalapura Sudarshan, and Sean Stratman, Proceedings of the 14th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2017.

A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations, Wilson Lian, Hovav Shacham, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2017.

2016

Datalography: Scaling Datalog Graph Analytics on Graph Processing Systems, Walaa Moustafa, Vicky Papavasileiou, Ken Yocum, and Alin Deutsch, Proceedings of the IEEE International Conference on Big Data, December 2016.

P-FatTree: A Multi-channel Datacenter Network Topology, William M. Mellette, Alex C. Snoeren, and George Porter, Proceedings of the 15th ACM Workshop on Hot Topics in Networks (HotNets-XV), Atlanta, GA, November 2016.

Early Detection of Configuration Errors to Reduce Failure Damage, Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, and Shankar Pasupathy, Proceedings of the 12th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Savannah, GA, November 2016. (Award paper).

Nanophotonic Devices and Circuits for Communications, Yeshaiahu Fainman, Andrew Grieco, George Porter, and Jordan Davis, Proceedings of the Third Annual International Conference on Nanoscale Computing and Communication (ACM Nanocom'16), New York, NY, September 2016.

You've Got Vulnerability: Exploring Effective Vulnerability Notifications, Frank Li, Zakir Durumeric, Jakub Czyz, Damon McCoy, Stefan Savage, Michael Bailey, and Vern Paxson, Proceedings of the 25th USENIX Security Symposium, Austin, TX, August 2016.

On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction, Steven Hill, Zhimin Zhou, Lawrence Saul, and Hovav Shacham, Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 2016.

Automobile Driver Fingerprinting, Miro Enev, Alex Takakuwa, Karl Koscher, and Tadayoshi Kohno, Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 2016.

Learning from Big Malwares, Linhai Song, Heqing Huang, Wu Zhou, Wenfei Wu, and Yiying Zhang, Proceedings of the 7th ACM Asia-Pacific Workshop on Systems (APSys), Hong Kong, China, August 2016.

DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior, Peng Huang, Tianyin Xu, Xinxin Jin, and Yuanyuan Zhou, Proceedings of the 14th International Conference on Mobile Systems, Applications, and Services (MobiSys'16), Singapore, June 2016.

Lost in Space: Improving Inference of IPv4 Address Space Utilization, Alberto Dainotti, Karyn Benson, Alistair King, Bradley Huffaker, Eduard Glatz, Xenofontas Dimitropoulos, Philipp Richter, Alessandro Finamore, and Alex C. Snoeren, IEEE Journal on Selected Areas in Communication 34(6), June 2016.

NChecker: Saving Mobile App Developers from Network Disruptions, Xinxin Jin, Peng Huang, Tianyin Xu, and Yuanyuan Zhou, Proceedings of the 11th ACM European Conference on Computer Systems (EuroSys'16), London, UK, April 2016.

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Communications of the Association for Computing Machinery 59(4):86-93, April 2016.

Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard, Zhenhua Li, Weiwei Wang, Tianyin Xu, Xin Zhong, Xiang-Yang Li, Yunhao Liu, Christo Wilson, and Ben Y. Zhao, Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI'16), Santa Clara, CA, USA, March 2016.

61 Port 1x6 Selector Switch for Data Center Networks, William Mellette, Glenn M. Schuster, George Porter, and Joseph Ford, Optical Fiber Communication Conference, March 2016, pages M3I.3.

Is memory disaggregation feasible? A case study with Spark SQL, Pramod Subba Rao and George Porter, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Santa Clara, CA, March 2016.

Stressing Out: Bitcoin "Stress Testing", Khaled Baqer, Danny Yuxing Huang, Nicholas Weaver, and Damon McCoy, BITCOIN '14: The Third Workshop on Bitcoin and Blockchain Research, Christ Church, Barbados, February 2016.

2015

Exploring Controller Area Networks, Ian Foster and Karl Koscher, USENIX ;login: 40(6), December 2015.

Integrated Space-division Multiplexer for Data Center Networks, Andrew Grieco, George Porter, and Yeshaiahu Fainman, IEEE Journal of Selected Topics in Quantum Electronics PP(99):1-1, October 2015.

Sorting 100TB on Google Compute Engine, Michael Conley, Amin Vahdat, and George Porter, UC San Diego technical report CS2015-2013, September 2015.

Scheduling Techniques for Hybrid Circuit/Packet Networks, He Liu, Matthew K. Mukerjee, Conglong Li, Nicolas Feltman, George Papen, Stefan Savage, Srinivasan Seshan, Geoffrey M. Voelker, David G. Andersen, Michael Kaminsky, George Porter, and Alex C. Snoeren, Proceedings of ACM CoNEXT, Heidelberg, Germany, December 2015.

Security by Any Other Name: On the Effectiveness of Provider Based Email Security, Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, October 2015.

Empirical Analysis of Search Advertising Strategies, Bhanu Vattikonda, Vacha Dave, Saikat Guha, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Leveraging Internet Background Radiation for Opportunistic Network Analysis, Karyn Benson, Alberto Dainotti, kc claffy, Alex C. Snoeren, and Michael Kallitsis, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

From .academy to .zone: An Analysis of the New TLD Land Rush, Tristan Halvorson, Matthew F. Der, Ian Foster, Stefan Savage, Lawrence K. Saul, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Who is .com? Learning to Parse WHOIS Records, Suqi Liu, Ian Foster, Stefan Savage, Geoffrey M. Voelker, and Lawrence K. Saul, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Affiliate Crookies: Characterizing Affiliate Marketing Abuse, Neha Chachra, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Offline Downloading in China: A Comparative Study, Zhenhua Li, Christo Wilson, Tianyin Xu, Yao Liu, Zhen Lu, and Yinlong Wang, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

An End-to-End Measurement of Certificate Revocation in the Web's PKI, Yabing Liu, Will Tome, Liang Zhang, David Choffnes, Dave Levin, Bruce Maggs, Alan Mislove, Aaron Schulman, and Christo Wilson, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Timeouts: Beware Surprisingly High Delay, Ramakrishna Padmanabhan, Patrick Owen, Aaron Schulman, and Neil Spring, Proceedings of the ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015.

Achieving Cost-efficient, Data-intensive Computing in the Cloud, Michael Conley, Amin Vahdat, and George Porter, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Kohala Coast, Hawaii, August 2015.

Hey, You Have Given Me Too Many Knobs! -- Understanding and Dealing with Over-Designed Configuration in System Software, Tianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy, and Rukma Talwadker, Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15), Bergamo, Italy, August 2015.

Inside the Social Network's (Datacenter) Network, Arjun Roy, Hongyi Zeng, Jasmeet Bagga, George Porter, and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Conference, London, England, August 2015.

PowerSpy: Location Tracking using Mobile Device Power Analysis, Yan Michalevsky, Gabi Nakibly, Aaron Schulman, and Dan Boneh, Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 2015.

Fast and Vulnerable: A Story of Telematic Failures, Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage, Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), Washington D.C., August 2015.

SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems, Karl Koscher, Tadayoshi Kohno, and David Molnar, Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), Washington D.C., August 2015.

Interpreting Advertiser Intent in Sponsored Search, Bhanu C. Vattikonda, Santhosh Kodipaka, Hongyan Zhou, Vacha Dave, Saikat Guha, and Alex C. Snoeren, Proceedings of the ACM SIGKDD Conference, Sydney, Australia, August 2015.

Nanophotonics: Technology and Application, Andrew Grieco, George Porter, and Yeshaiahu Fainman, Proceedings of the IEEE Optical MEMS and Nanophotonics Conference, Jerusalem, Israel, August 2015.

Systems Approaches to Tackling Configuration Errors: A Survey, Tianyin Xu and Yuanyuan Zhou, ACM Computing Surveys (CSUR) 47(4), July 2015.

Framing Dependencies Introduced by Underground Commoditization, Kurt Thomas, Danny Yuxing Huang, David Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna, Proceedings of the Workshop on the Economics of Information Security (WEIS), Delft, The Netherlands, June 2015.

A Study of Application Performance with Non-Volatile Main Memory, Yiying Zhang and Steven Swanson, Proceedings of the 31st IEEE Conference on Massive Data Storage (MSST), Santa Clara, CA, May 2015.

Removing the Costs and Retaining the Benefits of Flash-Based SSD Virtualization with FSDV, Yiying Zhang, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau, Proceedings of the 31st IEEE Conference on Massive Data Storage (MSST), Santa Clara, CA, May 2015.

ConfValley: A Systematic Configuration Validation Framework for Cloud Services, Peng Huang, William J. Bolosky, Abhishek Singh, and Yuanyuan Zhou, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Bordeuax, France, April 2015.

Scheduling for Data Center Networks with Reconfiguration Delay, Chang-Heng Wang, Tara Javidi, and George Porter, Proceedings of the IEEE Infocom Conference, Hong Kong, China, April 2015, pages 1-9.

Enfold: Downclocking OFDM in WiFi, Feng Lu, Patrick Ling, Geoffrey M. Voelker, and Alex C. Snoeren, GetMobile: Mobile Computing and Communications 19(2):10-13, April 2015.

Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure, Manu Bansal, Aaron Schulman, and Sachin Katti, Proceedings of the 12th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Oakland, CA, April 2015.

Managing Contention with Medley, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, IEEE Transcations on Mobile Computing 14(3), March 2015.

Achieving Congestion Diversity in Multi-hop Wireless Mesh Networks, Abhijeet A. Bhorkar, Tara Javidi, and Alex C. Snoeren, IEEE Transcations on Mobile Computing 15(3), March 2015.

Mojim: A Reliable and Highly-Available Non-Volatile Memory System, Yiying Zhang, Jian Yang, Amirsaman Memaripour, and Steven Swanson, Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Istanbul, Turkey, March 2015.

FTXen: Making Hypervisor Resilient to Hardware Faults on Relaxed Cores, Xinxin Jin, Soyeon Park, Tianwei Sheng, Rishan Chen, Zhiyong Shan, and Yuanyuan Zhou, Proceedings of the 21st IEEE International Symposium on High Performance Computer Architecture (HPCA'15), Bay Area, CA, February 2015.

CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks, Feng Lu, Hao Du, Ankur Jain, Geoffrey M. Voelker, Alex C. Snoeren, and Andreas Terzis, Proceedings of the 16th ACM International Workshop on Mobile Computing Systems and Applications (HotMobile), Sante Fe, NM, February 2015.

Too LeJIT to Quit: Extending JIT Spraying to ARM, Wilson Lian, Hovav Shacham, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2015.

2014

On The Security of Mobile Cockpit Information Systems, Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, and Kirill Levchenko, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.

Deniable Liaisons, Abhinav Narain, Nick Feamster, and Alex C. Snoeren, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.

Characterizing Large-Scale Click Fraud in ZeroAccess, Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.

Algebraic MACs and Keyed-Verification Anonymous Credentials, Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.

RevCast: Fast, Private Certificate Revocation over FM Radio, Aaron Schulman, Dave Levin, and Neil Spring, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, November 2014.

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns, David Wang, Matthew Der, Mohammad Karami, Lawrence Saul, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014, pages 359-372.

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild, Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.

Towards Network-level Efficiency for Cloud Storage Services, Zhenhua Li, Cheng Jin, Tianyin Xu, Christo Wilson, Yao Liu, Linsong Cheng, Yunhao Liu, Yafei Dai, and Zhi-Li Zhang, Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.

Challenges in Inferring Internet Interdomain Congestion, Matthew Luckie, Amogh Dhamdhere, David Clark, Bradley Huffaker, and kc claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.

Inferring Complex AS Relationships, Vasileios Giotsas, Matthew Luckie, Bradley Huffaker, and kc claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.

Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed, Liang Zhang, Dave Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, and Christo Wilson, Proceedings of the ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.

Willow: A Programmable SSD, Sundaram Bhaskaran, Trevor Bunker, Arup De, Mark Gahagan, Yanqin Jin, Robert Liu, Sudharsan Seshadri, and Steven Swanson, Proceedings of the 11th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, CO, October 2014.

Blender: Upgrading Tenant-based Data Center Networking, Kevin C. Webb, Arjun Roy, Kenneth Yocum, and Alex C. Snoeren, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Marina del Rey, CA, October 2014.

Enfold: Downclocking OFDM in WiFi, Feng Lu, Patrick Ling, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Maui, HI, September 2014.

Cutting the Cord: a Robust Wireless Facilities Network for Data Centers, Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao, and Haitao Zheng, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Maui, HI, September 2014.

DREAM: Dynamic Resource Allocation for Software-defined Measurement, Masoud Moshref, Minlan Yu, Ramesh Govindan, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Chicago, IL, August 2014.

Hulk: Eliciting Malicious Behavior in Browser Extensions, Alexandros Kapravelos, Chris Grier, Neha Chachra, Chris Kruegel, Giovanni Vigna, and Vern Paxson, Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, August 2014.

Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise, Matthew Der, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, New York, NY, August 2014.

A Spectral Algorithm for Learning Class-Based n-gram Models of Natural Language, Karl Stratos, Do-kyum Kim, Daniel Hsu, and Michael Collins, Proceedings of the 30th Conference on Uncertainty in Artificial Intelligence (UAI 2014), Quebec City, Canada, July 2014.

Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting, Neha Chachra, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014, pages 4:1:1-4:1:13.

Performance Regression Testing Target Prioritization via Performance Risk Analysis, Peng Huang, Xiao Ma, Dongcai Shen, and Yuanyuan Zhou, Proceedings of the International Conference on Software Engineering (ICSE), Hyderabad, India, May 2014.

WCMP: Weighted Cost Multipathing for Improved Fairness in Data Centers, Junlan Zhou, Malveeka Tewari, Min Zhu, Abdul Kabbani, Leon Poutievski, Arjun Singh, and Amin Vahdat, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Amsterdam, The Netherlands, April 2014.

A Gaussian Latent Variable Model for Large Margin Classification of Labeled and Unlabeled Data, Do-kyum Kim, Matthew Der, and Lawrence K. Saul, Proceedings of the 17th International Conference on Artificial Intelligence and Statistics (AISTATS), Reykjavik, Iceland, April 2014.

XXXtortion? Inferring Registration Intent in the .XXX TLD, Tristan Halvorson, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International World Wide Web Conference (WWW)`, Seoul, Korea, April 2014, pages 901-912.

SENIC: A Scalable NIC for End-Host Rate Limiting, Sivasankar Radhakrishnan, Yilong Geng, Vimalkumar Jeyakumar, Abdul Kabbani, George Porter, and Amin Vahdat, Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014.

Circuit Switching Under the Radar with REACToR, He Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, and George Porter, Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014, pages 1-15.

Libra: Divide and Conquer to Verify Formading Tables in Huge Networks, Hongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, and Amin Vahdat, Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014.

Wideband silicon-photonic thermo-optic switch in a wavelength-division multiplexed ring network, Ryan Aguinaldo, Alex Forencich, Christopher DeRose, Anthony Lentine, Douglas C. Trotter, Yeshaiahu Fainman, George Porter, George Papen, and Shayan Mookherjea, Opt. Express 22(7):8205-8218, April 2014.

Exposing Inconsistent Web Search Results with Bobble, Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, and Alex C. Snoeren, Proceedings of the Passive and Active Measurement Conference (PAM), Los Angeles, CA, March 2014.

EnCore: Exploiting System Environment and Correlation Information for Misconfiguration Detection, Jiaqi Zhang, Lakshminarayanan Renganarayana, Xiaolan Zhang, Niyu Ge, Vasanth Bala, Tianyin Xu, and Yuanyuan Zhou, Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Salt Lake City, UT, March 2014.

Botcoin: Monetizing Stolen Cycles, Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, and Kirill Levchenko, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

DSpin: Detecting Automatically Spun Content on the Web, Qing Zhang, David Wang, and Geoffrey M. Voelker, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014, pages 4:1:1-4:1:16.

SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks, Dongseok Jang, Zachary Tatlock, and Sorin Lerner, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

2013

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, USENIX ;login: 38(6):10-14, December 2013.

Views and Transactional Storage for Large Graphs, Michael Lee, Indrajit Roy, Alvin AuYoung, Vanish Talwar, K.R. Jayaram, and Yuanyuan Zhou, Proceedings of the ACM/IFIP/USENIX Middleware Conference, Bejing, China, December 2013. (Best paper).

Directing Data Center Traffic, Yeshaiahu Fainman and George Porter, Science 342(6155):202-203, 2013.

Aspen Trees: Balancing Data Center Fault Tolerance, Scalability and Cost, Meg Walraed-Sullivan, Amin Vahdat, and Keith Marzullo, Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013.

Bullet Trains: A Study of NIC Burst Behavior at Microsecond Timescales, Rishi Kapoor, Alex C. Snoeren, Geoffrey M. Voelker, and George Porter, Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013, pages 133-138.

FasTrak: Enabling Express Lanes in Multi-Tenant Data Centers, Radhika Niranjan Mysore, George Porter, and Amin Vahdat, Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013.

Do Not Blame Users for Misconfigurations, Tianyin Xu, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, and Shankar Pasupathy, Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), Nemacolin Woodlands Resort, Pennsylvania, November 2013.

From ARIES to MARS:Transaction Support for Next-Generation Solid-State Drives, Joel Coburn, Trevor Bunker, Meir Shwarz, Rajesh K. Gupta, and Steven Swanson, Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), Nemacolin Woodlands Resort, Pennsylvania, November 2013.

Scalable Coordination of a Tightly-Coupled Service in the Wide Area, Kevin C. Webb, Bhanu C. Vattikonda, Kenneth Yocum, and Alex C. Snoeren, Proceedings of the ACM Conference on Timely Results in Operating Systems, Farmington, PA, November 2013.

ViceROI: Catching Click-Spam in Search Ad Networks, Vacha Dave, Saikat Guha, and Yin Zhang, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013.

Dahu: Commodity Switches for Direct Connect Data Center Networks, Sivasankar Radhakrishnan, Malveeka Tewari, Rishi Kapoor, George Porter, and Amin Vahdat, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), San Jose, CA, October 2013.

A Multiport Microsecond Optical Circuit Switch for Data Center Networking, Nathan Farrington, Alex Forencich, George Porter, Pang-Chen Sun, Joseph Ford, Yeshaiahu Fainman, George C. Papen, and Amin Vahdat, IEEE Photonics Technology Letters 25(16):1589-1592, 2013.

A Comparison of Syslog and IS-IS for Monitoring Link State, Daniel Turner, Kirill Levchenko, Stefan Savage, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013.

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013, pages 127-140.

Internet Nameserver IPv4 and IPv6 Address Relationships, Arthur Berger, Nicholas Weaver, Robert Beverly, and Larry Campbell, Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013.

Speedtrap: Internet-Scale IPv6 Alias Resolution, Matthew Luckie, Robert Beverly, William Brinkmeyer, and kc claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013.

AS Relationships, Customer Cones, and Validation, Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileous Giotsas, and kc claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Barcelona, Spain, October 2013.

Scalable Lineage Capture for Debugging DISC Analytics, Kenneth Yocum, Dionysios Logothetis, and Soumyarupa De, Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2013.

High-Fidelity Switch Models for Software-Defined Network Emulation, Danny Yuxing Huang, Ken Yocum, and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Hong Kong, China, August 2013.

B4: Experience with a Globally Deployed Software Defined WAN, Sushant Jain, Alok Kumar, Subhasree Mandal, Joon Ong, Leon Poutievski, Arjun Singh, Subbaiah Venkata, Jim Wanderer, Junlan Zhou, Min Zhu, Jonathan Zolla, Urs Hölzle, Stephen Stuart, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.

Integrating Microsecond Circuit Switching into the Data Center, George Porter, Richard Strong, Nathan Farrington, Alex Forencich, Pang-Chen Sun, Tajana Rosing, Yeshaiahu Fainman, George Papen, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.

Fast Programmable Match-Action Processing in Hardware for SDN, Pat Bosshart, Glen Gibb, Hun-Seok Kim, George Varghese, Nick McKeown, Martin Izzard, Fernando Mujica, and Mark Horowitz, Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.

Take This Personally: Pollution Attacks on Personalized Services, Xinyu Xing, Wei Ming, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee, Proceedings of the 22nd USENIX Security Symposium, Washington D.C., August 2013.

Measuring the Practical Impact of DNSSEC Deployment, Wilson Lian, Eric Rescorla, Hovav Shacham, and Stefan Savage, Proceedings of the 22nd USENIX Security Symposium, Washington D.C., August 2013.

Practical Comprehensive Bounds on Surreptitious Communication over DNS, Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula Rao, Reiner Sailer, Doug Shales, Mark Stoecklin, Kurt Thomas, Wietse Venema, and Nicholas Weaver, Proceedings of the 22nd USENIX Security Symposium, Washington D.C., August 2013.

Challenges in the Emulation of Large Scale Software Defined Networks, Arjun Roy, Kenneth Yocum, and Alex C. Snoeren, Proceedings of the 4th ACM Asia-Pacific Workshop on Systems (APSys), Singapore, July 2013.

Optical/Electrical Hybrid Switching for Datacenter Communications, Nathan Farrington, George Porter, Alex Forencich, Joseph Ford, Yeshaiahu Fainman, Amin Vahdat, and George Papen, Proceedings of the 18th OptoElectronics and Communications Conference (OECC2013) / Photonics in Switching 2013 (PS2013), Kyoto, Japan, July 2013.

NicPic: Scalable and Accurate End-Host Rate Limiting, Sivasankar Radhakrishnan, Vimalkumar Jeyakumar, Abdul Kabbani, George Porter, and Amin Vahdat, Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud-V), San Jose, CA, June 2013.

Bug Characteristics in Open Source Software, Lin Tan, Chen Liu, Zhenmin Li, Xuanhui Wang, Yuanyuan Zhou, and Chengxiang Zhai, Springer Journal of Empirical Software Engineering, June 2013.

Quantifying the Benefits of Joint Content and Network Routing, Vaytautas Valancius, Bharath Ravi, Nick Feamster, and Alex C. Snoeren, Proceedings of the ACM SIGMETRICS Conference, Pittsburgh, PA, June 2013.

ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowsourcing, Yuvraj Agarwal and Malcom Hall, Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Taipei, Taiwan, June 2013.

A Variational Approximation for Topic Modeling of Hierarchical Corpora, Do-kyum Kim, Geoffrey M. Voelker, and Lawrence K. Saul, Proceedings of the International Conference on Machine Learning, Atlanta, GA, June 2013, pages 2:55-2:63.

Warped Mirrors for Flash, Yiying Zhang, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau, Proceedings of the 29th IEEE Conference on Massive Data Storage (MSST), Long Beach, CA, May 2013.

SloMo: Downclocking WiFi Communication, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 245-258.

eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones, Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, and Geoffrey M. Voelker, Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 57-70.

Real Time Network Policy Checking Using Header Space Analysis, Peyman Kazemian, Michael Chang, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte, Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013.

See Straight Through Data Center Bandwidth Limitations with X-Rays, George Porter, Proceedings of TinyTOCS, Reconfigurable wireless X-Ray links in data centers could deliver 40 Pb/sec, but would have to be turned off while operators are present, April 2013.

The Day After Patch Tuesday: Effects Observable in IP Darkspace Traffic, Tanja Zseby, Alistair King, Nevil Borwnlee, and kc claffy, Proceedings of the Passive and Active Measurement Conference, Hong Kong, China, March 2013.

A Coordinated View of the Temporal Evolution of Large-scale Internet Events, Alistair King, Bradley Huffaker, Alberto Dainotti, and kc claffy, Proceedings of the Passive and Active Measurement Conference, Hong Kong, China, March 2013.

A 10 us Hybrid Optical-Circuit/Electrical-Packet Network for Data Centers, Nathan Farrington, Alex Forencich, Pang-Chen Sun, Shaya Fainman, Joe Ford, Amin Vahdat, George Porter, and George C. Papen, Proceedings of OFC/NFOEC, Anaheim, CA, March 2013.

Scalability vs. Fault Tolerance in Aspen Trees, Meg Walraed-Sullivan, Keith Marzullo, and Amin Vahdat, Microsoft Research technical report MSR-TR-2013-21, February 2013.

TritonSort: A balanced and energy-efficient large-scale sorting system, Alexander Rasmussen, George Porter, Michael Conley, Harsha Madhyastha, Radhika Niranjan Mysore, Alexander Pucher, and Amin Vahdat, ACM Transactions on Computer Systems 31(1), February 2013.

Getting Real: Lessons in Transitioning Research Simulations into Hardware Systems, Mohit Saxena, Yiying Zhang, Michael M. Swift, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau, Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2013.

Warming up Storage-Level Caches with Bonfire, Yiying Zhang, Gokul Soundararajan, Mark W. Storer, Lakshmi N. Bairavasundaram, Sethuraman Subbiah, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau, Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2013.

Juice: A Longitudinal Study of an SEO Campaign, David Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2013, pages 7:4:1-7:4:17.

2012

Taster's Choice: A Comparative Analysis of Spam Feeds, Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2012, pages 427-440.

Analyis of a '/0' Stealth Scan from a Botnet, Alberto Dainotti, Alistair King, kc claffy, Ferdinando Papale, and Antonio Pescapé, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2012.

Fathom: A Browser-based Network Measurement Platform, Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, and Vern Paxson, Proceedings of the ACM Internet Measurement Conference (IMC), Boston, MA, November 2012.

Hunting Mice with Microsecond Circuit Switches, Nathan Farrington, George Porter, Yeshaiahu Fainman, George Papen, and Amin Vahdat, Proceedings of the 11th ACM Workshop on Hot Topics in Networks (HotNets-XI), Redmond, WA, October 2012.

Chronos: Predictable Low Latency for Data Center Applications, Rishi Kapoor, George Porter, Malveeka Tewari, Geoffrey M. Voelker, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2012, pages 9:1-9:14.

Themis: An I/O-Efficient MapReduce, Alexander Rasmussen, Michael Conley, Rishi Kapoor, Vinh The Lam, George Porter, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2012.

xOMB: Extensible Open Middleboxes with Commodity Servers, James William Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Austin, Texas, October 2012.

NetBump: User-extensible Active Queue Management with Bumps on the Wire, Mohammad Al-Fares, Rishi Kapoor, George Porter, Sambit Das, Hakim Weatherspoon, Balaji Prabhakar, and Amin Vahdat, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Austin, Texas, October 2012.

Torchestra: Reducing Interactive Traffic Delays over Tor, Deepika Gopal and Nadia Heninger, Proceedings of the Workshop on Privacy in the Electronic Society (WPES), Raleigh, NC, October 2012.

Priceless: The Role of Payments in Abuse-advertised Goods, Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012, pages 845-856.

Manufacturing Compromise: The Emergence of Exploit-as-a-Service, Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012, pages 821-832.

Be Conservative: Enhancing Failure Diagnosis with Proactive Logging, Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael Lee, Xiaoming Tang, Yuanyuan Zhou, and Stefan Savage, Proceedings of the 10th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Hollywood, CA, October 2012.

Accurate Characterization of Variability in Power Consumption in Modern Computing Platforms, Bharathan Balaji, John McCullough, Rajesh Gupta, and Yuvraj Agarwal, Workshop on Power-Aware Computing and Systems (HotPower), Hollywood, CA, October 2012.

TinyTOCS as an Experimental Laboratory, George Porter, Proceedings of TinyTOCS, When rethinking academic publishing, don't retrofit a cathedral onto what should be a bazaar, September 2012.

RadioJockey: Mining Program Execution to Optimize Cellular Radio Usage, Pavan K Athivarapu, Ranjita Bhagwan, Saikat Guha, Vishnu Navda, Ramachandran Ramjee, Dushyant Arora, Venkata N. Padmanabhan, and George Varghese, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Istanbul, Turkey, August 2012.

A Demonstration of Ultra-low Latency Data Center Optical Circuit Switching (Demo session), Nathan Farrington, George Porter, Pang-Chen Sun, Alex Forencich, Joseph Ford, Yeshaiahu Fainman, George Papen, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.

NetPilot: Automating Datacenter Network Failure Mitigation, Xin Wi, Daniel Turner, George Chen, Dave Maltz, Xiaowei Yang, Lihua Yuan, and Ming Zhang, Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.

Mirror Mirror on the Ceiling: Flexible Wireless Links for Data Centers, Xia Zhou, Zengbin Zhang, Yibo Li, Saipriya Kumar, Amin Vahdat, Ben Y. Zhao, and Haitao Zheng, Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.

Establishing Browser Security Guarantees through Formal Shim Verification, Dongseok Jang, Zachary Tatlock, and Sorin Lerner, Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, August 2012.

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs, Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko, Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, August 2012.

When Good Services Go Wild: Reassembling Web Services for Unintended Purposes, Feng Lu, Jiaqi Zhang, and Stefan Savage, Proceedings of the USENIX Workshop on Hot Topics in Security, Bellevue, WA, August 2012.

NetShare and Stochastic NetShare: Predictable Bandwidth Allocation for Data Centers, Vinh The Lam, Sivasankar Radhakrishnan, Amin Vahdat, George Varghese, and Rang Pan, ACM SIGCOMM Computer Communication Review 42(3), July 2012.

scc: Cluster Storage Provisioning Informed by Application Characteristics and SLAs, Harsha V. Madhyastha, John C. McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, and Amin Vahdat, USENIX ;login: 37(3), June 2012.

Economic Analysis of Cybercrime in Crowdsourced Labor Markets, Vaibhav Garg, Chris Kanich, and L. Jean Camp, Proceedings of the Workshop on the Economics of Information Security (WEIS), Berlin, Germany, June 2012.

Measuring the Cost of Cybercrime, Ross Anderson, Chris Barton, Rainer Boehme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage, Proceedings of the Workshop on the Economics of Information Security (WEIS), Berlin, Germany, June 2012.

Router Support for Fine-Grained Latency Measurements, Ramana Rao Kompella, Kirill Levchenko, Alex C Snoeren, and George Varghese, IEEE/ACM Transactions on Networking 20(3):811-824, June 2012.

When You Don't Trust Clients: Byzantine Proposer Fast Paxos, Hein Meling, Keith Marzullo, and Alessandro Mei, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Macau, China, June 2012.

Software Abstractions for Trusted Sensors, He Liu, Stefan Saroiu, Alex Wolman, and Humanshu Raj, Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Low Wood Bay, Lake District, UK, June 2012.

Characterizing Logging Practices in Open-Source Software, Ding Yuan, Soyeon Park, and Yuanyuan Zhou, Proceedings of the International Conference on Software Engineering (ICSE), Zurich, Switzerland, June 2012.

Internet-Scale IPv4 Alias Resolution with MIDAR, Ken Keys, Young Hyun, Matthew Luckie, and kc claffy, IEEE/ACM Transactions on Networking 21(2), April 2012.

FlashTier: a Lightweight, Consistent and Durable Storage Cache, Mohit Saxena, Michael M. Swift, and Yiying Zhang, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Bern, Switzerland, April 2012.

Practical TDMA for Datacenter Ethernet, Bhanu Vattikonda, George Porter, Amin Vahdat, and Alex C. Snoeren, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Bern, Switzerland, April 2012.

Less is More: Trading a little Bandwidth for Ultra-Low Latency in the Data Center, Mohammad Alizadeh, Abdul Kabbani, Tom Edsall, Balaji Prabhakar, Amin Vahdat, and Masato Yasuda, Proceedings of the 9th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2012.

Header Space Analysis: Static Checking for Networks, Peyman Kazemian, George Varghese, and Nick McKeown, Proceedings of the 9th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2012.

Weighted Fair Queuing with Differential Dropping, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the IEEE Infocom Conference, Orlando, FL, April 2012. (Mini-conference).

Return-Oriented Programming: Systems, Languages and Applications, Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage, ACM Transactions on Information and System Security 15(1), March 2012.

The BIZ Top-Level Domain: Ten Years Later, Tristan Halvorson, Janos Szurdi, Gregor Maier, Mark Felegyhazi, Christian Kreibich, Nicholas Weaver, Kirill Levchenko, and Vern Paxson, Proceedings of the Passive and Active Measurement Conference, Vienna, Austria, March 2012.

Improving Software Diagnosability via Log Enhancement, Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, and Stefan Savage, ACM Transactions on Computer Systems 30(1), February 2012.

De-indirection for Flash-based SSDs with Nameless Writes, Yiying Zhang, Leo Prasath Arulraj, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau, Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012.

BlueSky: A Cloud-Backed File System for the Enterprise, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012, pages 19:1-19:14.

scc: Cluster Storage Provisioning Informed by Application Characteristics and SLAs, Harsha V. Madhyastha, John C. McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012.

Limitations of scanned human copresence encounters for modelling proximity-borne malware, James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, and Per Johansson, Proceedings of the International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, January 2012, pages F1.1.4:1--F1.1.5:10.

Extracting benefit from harm: using malware pollution to analyze the impac of political and geophysical events on the Internet, Alberto Dainotti, Roman Amman, Emil Aben, and kc claffy, ACM SIGCOMM Computer Communication Review 42(1), January 2012.

2011

In Planning Digital Defenses, the Biggest Obstacle is Human Ingenuity, Stefan Savage, New York Times, Dec 6 2011.

TCP Fast Open, Sivasankar Radhakrishnan, Yuchung Cheng, Jerry Chu, Arvind Jain, and Barath Raghavan, Proceedings of ACM CoNEXT, Tokyo, Japan, December 2011.

Distributed Application Configuration, Management, and Visualization with Plush, Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, ACM Transactions on Internet Technology (TOIT) 11(2), Dec 2011.

GQ: Practical Containment for Measuring Modern Malware Systems, Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, and Vern Paxson, Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.

An Analysis of Underground Forums, Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011, pages 71-80.

Analysis of Country-wide Internet Outages Caused by Censorship, Alberto Dainotti, Claudio Squarcella, Emile Aben, kc claffy, Marco Chiesa, Michele Russo, and Antonio Pescapé, Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.

Pingin' in the Rain, Aaron Schulman and Neil Spring, Proceedings of the ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.

ALIAS: Scalable, Decentralized Label Assignment for Data Centers, Meg Walraed-Sullivan, Radhika Niranjan Mysore, Malveeka Tewari, Ying Zhang, Keith Marzullo, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Cascais, Portugal, October 2011.

Switching the Optical Divide: Fundamental Challenges for Hybrid Electrical/Optical Datacenter Networks, Hamid Hajabdolali Bazzaz, Malveeka Tewari, Guohui Wang, George Porter, T. S. Eugene Ng, David G. Andersen, Michael Kaminsky, Michael A. Kozuch, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Cascais, Portugal, October 2011.

An Empirical Study on Configuration Errors in Commercial and Open Source Systems, Zuoning Yin, Xiao Ma, Jing Zheng, Yuanyuan Zhou, Lakshmi Bairavasundaram, and Shankar Pasupathy, Proceedings of the 23th ACM Symposium on Operating Systems Principles (SOSP), Cascais, Portugal, October 2011.

A Characterization of Node Update Distributions in the PlanetLab Test Bed, Hakon Verespej and Joseph Pasquale, Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, October 2011.

Judging a site by its content: learning the textual, structural, and visual features of malicious Web pages, Sushma Nagesh Bannur, Lawrence K. Saul, and Stefan Savage, Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011.

Topic Modeling of Freelance Job Postings to Monitor Web Service Abuse, Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, and Lawrence K. Saul, Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011, pages 11-20.

Cloak and Dagger: Dynamics of Web Search Cloaking, David Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011, pages 477-490.

On the Empirical Performance of Self-calibrating WiFi Location Systems, Daniel Turner, Stefan Savage, and Alex C. Snoeren, Proceedings of IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, October 2011.

How Do Fixes Become Bugs? -- A Comprehensive Characteristic Study on Incorrect Fixes in Commercial and Open Source Operating Systems, Zuoning Yin, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy, and Lakshmi N. Bairavasundaram, Proceedings of the European Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE), Szeged, Hungary, September 2011.

What's the Difference? Efficient Set Reconciliation without Prior Context, David Eppstein, Michael T. Goodrich, Frank Uyeda, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Toronto, Canada, August 2011.

Interview with Stefan Savage: On the Spam Payment Trail, Rik Farrow and Stefan Savage, USENIX ;login: 36(4):7-20, August 2011.

Putting Out a HIT: Crowdsourcing Malware Installs, Chris Kanich, Stephen Checkoway, and Keaton Mowery, Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), San Francisco, CA, August 2011.

Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks, Keaton Mowery, Sarah Meiklejohn, and Stefan Savage, Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), San Francisco, CA, August 2011.

No Plan Survives Contact: Experience with Cybercrime Measurement, Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011, pages 2:1-2:8.

ExperimenTor: A Testbed for Safe Realistic Tor Experimentation, Kevin Bauer, Micah Sherr, Damon McCoy, and Dirk Grunwald, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011.

Show Me the Money: Characterizing Spam-advertised Revenue, Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011, pages 219-234.

Dirty Jobs: The Role of Freelance Labor in Web Service Abuse, Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011, pages 203-218.

Comprehensive Experimental Analyses of Automotive Attack Surfaces, Stephen Checkoway, Damon McCoy, Danny Anderson, Brian Kantor, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno, Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011.

The Phantom Tollbooth: Privacy-preserving Electronic Toll Collection in the Presence of Driver Collusion, Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, and Hovav Shacham, Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011.

DefenestraTor: Throwing out Windows in Tor, Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011, pages 134-154.

DieCast: Testing Distributed Systems with an Accurate Scale Model, Diwaker Gupta, Kashi V. Vishwanath, Marvin McNett, Amin Vahdat, Ken Yocum, Alex C. Snoeren, and Geoffrey M. Voelker, ACM Transactions on Computer Systems 29(2):4:1-4:48, May 2011.

Evaluating the Effectiveness of Model-Based Power Characterization, John McCullough, Yuvraj Agarwal, Jaideep Chandrashekhar, Sathyanarayan Kuppuswamy, Alex C. Snoeren, and Rajesh Gupta, Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.

Context-based Online Configuration-Error Detection, Ding Yuan, Yinglian Xie, Rina Panigrahy, Junfeng Yang, Chad Verbowski, and Arunvijay Kumar, Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.

In-situ MapReduce for Log Processing, Dionysios Logothetis, Chris Trezzo, Kevin C. Webb, and Kenneth Yocum, Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.

Fine-Grained Latency and Loss Measurements in the Presence of Reordering, Myunglin Lee, Sharon Goldberg, Ramana Rao Kompella, and George Varghese, Proceedings of the ACM SIGMETRICS Conference, San Jose, CA, June 2011.

Privacy-preserving Network Forensics, Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, and Geoffrey M. Voelker, Communications of the Association for Computing Machinery 54(5):78-87, May 2011.

Click Trajectories: End-to-End Analysis of the Spam Value Chain, Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2011, pages 431-446. (Award paper).

aComment: Mining Annotations from Comments and Code to Detect Interrupt-Related Concurrency Bugs, Lin Tan, Yuanyuan Zhou, and Yoan Papioleau, Proceedings of the International Conference on Software Engineering (ICSE), Honolulu, HI, May 2011.

Learning to Detect Malicious URLs, Justin Ma, Lawrence K Saul, Stefan Savage, and Geoffrey M Voelker, ACM Transactions on Intelligent Systems and Technology (TIST) 2(3):30:1-30:24, April 2011.

Dissemination in Opportunistic Mobile Ad-hoc Networks: the Power of the Crowd, Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, and Christophe Diot, Proceedings of the IEEE Infocom Conference, Shanghai, China, April 2011, pages 1179-1187.

Achieving Congestion Diversity in Wireless Ad-hoc Networks, Abhijeet A. Bhorkar, Tara Javidi, and Alex C. Snoeren, Proceedings of the IEEE Infocom Conference, Shanghai, China, April 2011. (Mini-conference).

The Emerging Optical Data Center, Amin Vahdat, Hong Liu, Xiaoxue Zhao, and Chris Johnson, Proceedings of OFC/NFOEC, Los Angeles, CA, March 2011.

Hardware Requirements for Optical Circuit Switched Data Center Networks, Nathan Farrington, Yeshaiahu Fainman, Hong Liu, George Papen, and Amin Vahdat, Proceedings of OFC/NFOEC, Los Angeles, CA, March 2011.

TritonSort: A Balanced Large-Scale Sorting System, Alexander Rasmussen, George Porter, Michael Conley, Harsha V. Madhyastha, Radhika Niranjan Mysore, Alexander Pucher, and Amin Vahdat, Proceedings of the 8th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2011.

Efficiently Measuring Bandwidth at All Time Scales, Frank Uyeda, Luca Foschini, Subhash Suri, and George Varghese, Proceedings of the 8th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2011.

On the Effects of Registrar-level Intervention, He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, March 2011, pages 1-8.

Topology Switching for Data Center Networks, Kevin Webb, Alex C. Snoeren, and Kenneth Yocum, USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, Boston, MA, March 2011.

Got Traffic? An Evaluation of Click Traffic Providers, Qing Zhang, Thomas Ristenpart, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the WICOM/AIRWeb Workshop on Web Quality (WebQuality), Hyderabad, India, March 2011, pages 19-26.

Improving Software Diagnosability via Log Enhancement, Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, and Stefan Savage, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Newport Beach, CA, March 2011.

Proximax: Fighting Censorship with an Adaptive System for Distribution of Open Proxies, Damon McCoy, Jose Andre Morales, and Kirill Levchenko, Proceedings of the International Conference on Financial Cryptography and Data Security (FC), St Lucia, February 2011.

Sora: High-performance Software Radio using General-purpose Multi-core Processors, Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, and Geoffrey M. Voelker, Communications of the Association for Computing Machinery 54(1):99-107, January 2011.

Measured Impact of Crooked Traceroute, Matthew Luckie, Amogh Dhamdhere, kc claffy, and David Murrell, ACM SIGCOMM Computer Communication Review 41(1), January 2011.

2010

Knowledge File System -- A principled approach to personal information management, Kuiyu Chang, I Wayan Tresna Perdana, Bramandia Ramadhana, Kailash Sethuraman, Truc Viet Le, and Neha Chachra, IEEE ICDM Workshop on Data Mining for Services, Sydney, Australia, December 2010, pages 1037-1044.

Scale-Out Networking in the Data Center, Amin Vahdat, Mohammad Al-Fares, Nathan Farrington, Radhika Niranjan Mysore, George Porter, and Sivasankar Radhakrishnan, IEEE MICRO 30(4):29-41, August 2010.

Practical Defenses for Evil Twin Attacks in 802.11, Harold Gonzales, Kevin Bauer, Janne Lindqvist, and Damon McCoy, Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.

Toward Improving Path Selection in Tor, Fallon T. Chen and Joseph Pasquale, Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.

VNC in High-Latency Environments and Techniques for Improvement, Taurin Tan-atichat and Joseph Pasquale, Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.

Resolving IP Aliases with Prespecified Timestamps, Justine Sherry, Ethan Katz-Bassett, Mary Pimenova, Harsha V. Madhyastha, Arvind Krishnamurthy, and Thomas Anderson, Proceedings of the ACM Internet Measurement Conference (IMC), Melbourne, Australia, November 2010.

How to Tell an Airport from a Home: Techniques and Applications, Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martin Abadi, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, CA, October 2010, pages 13:1-13:6.

Fault Localization via Risk Modeling, Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren, IEEE Transactions on Dependable and Secure Computing 7(4):396-409, October 2010.

Difference Engine: Harnessing Memory Redundancy in Virtual Machines, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, Communications of the Association for Computing Machinery 53(10):85-93, October 2010.

Usage Patterns in an Urban WiFi Network, Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, and Alex C. Snoeren, IEEE/ACM Transactions on Networking 18(5):1359-1372, October 2010.

Ad Hoc Synchronization Considered Harmful, Weiwei Xiong, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou, and Zhiqiang Ma, Proceedings of the 9th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vancouver, Canada, October 2010.

Do I Use the Wrong Definition? DefUse: Definition-Use Invariants for Detecting Concurrency and Sequential Bugs, Yao Shi, Soyeon Park, Suoning Yin, Shan Lu, Yuanyuan Zhou, Wenguang Chen, and Weimin Zheng, Proceedings of the Conference on Object-Oriented Programming: Systems, Languages, and Applications (OOPSLA), October 2010.

Hyperbolic Geometry of Complex Networks, Dmitri Krioukov, Fragkiskos Papadopoulos, Maksim Kitsak, Amin Vahdat, and Marian Boguna, Physical Review E 82(3), September 2010.

Helios: A Hybrid Electrical/Optical Switch Architecture for Modular Data Centers, Nathan Farrington, George Porter, Sivasankar Radhakrishnan, Hamid Bazzaz, Vikram Subramanya, Yeshaiahu Fainman, George Papen, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, New Delhi, India, August 2010.

California Fault Lines: Understanding the Causes and Impact of Network Failures, Daniel Turner, Kirill Levchenko, Alex C. Snoeren, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, New Delhi, India, August 2010.

Re: CAPTCHAs -- Understanding CAPTCHA-Solving from an Economic Context, Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 19th USENIX Security Symposium, Washington, D.C., August 2010, pages 435-452.

Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits, Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Washington D.C., July 2010, pages 105-114.

Towards Understanding Bugs in Open Source Router Software, Zuoning Yin, Matthew Caesar, and Yuanyuan Zhou, ACM SIGCOMM Computer Communication Review 40(3), July 2010.

Improving HTTP-based Video Performance using Network Flow Buffering, Jesse Steinberg and Joseph Pasquale, Proceedings of the 15th IEEE Symposium on Computers and Communications (ISCC), Riccione, Italy, June 2010.

SecondLife: a Social Network of Humans and Bots, Matteo Varvello and Geoffrey M. Voelker, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Amsterdam, The Netherlands, June 2010, pages 9-14.

Measuring Online Service Availability Using Twitter, Marti Motoyama, Brendan Meeder, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of ACM Workshop on Online Social Networks (WOSN), Boston, MA, June 2010, pages 13:1-13:9.

Stout: An Adaptive Interface to Scalable Cloud Storage, John C. McCullough, John Dunagan, Alec Wolman, and Alex C. Snoeren, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2010.

SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments, Yuvraj Agarwal, Stefan Savage, and Rajesh Gupta, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2010.

Stateful Bulk Processing for Incremental Algorithms, Dionysios Logothetis, Christopher Olston, Benjamin Reed, Kevin C. Webb, and Ken Yocum, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Indianapolis, IN, June 2010.

Fluxo: A System for Internet Service Programming by Non-expert Developers, Emre Kiciman, Benjamin Livshits, Madanlal Musuvathi, and Kevin C. Webb, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Indianapolis, IN, June 2010.

Improving Video Performance in VNC Under Latency Conditions, Cynthia Taylor and Joseph Pasquale, Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS), Chicago, May 2010.

Experimental Security Analysis of a Modern Automobile, Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2010.

Exploiting Feature Covariance in High-Dimensional Online Learning, Justin Ma, Alex Kulesza, Mark Dredze, Koby Crammer, Lawrence K. Saul, and Fernando Pereira, Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS), Sardinia, Italy, May 2010.

Analysis of Durability of Replicated Distributed Storage Systems, Sriram Ramabhadran and Joseph Pasquale, Proceedings of the International Parallel and Distributed Processing Symposium, Atlanta, GA, April 2010.

SlimGene: Compressing Genomic Sequences using SLIMGENE, Christos Kozanitis, Chris Saunders, Semyon Krugylak, Vineet Bafna, and George Varghese, Proceedings of the International Conference on Research in Computational Molecular Biology, Lisbon, Portugal, April 2010.

Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer, Stephen Checkoway, Hovav Shacham, and Eric Rescorla, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Jose, CA, April 2010.

Experiences with Tracing Causality in Networked Services, Rodrigo Fonseca, Michael J. Freedman, and George Porter, Proceedings of the Internet Network Management Workshop / Workshop on Research on Enterprise Networking (INM/WREN), San Jose, CA, April 2010.

Hedera: Dynamic Flow Scheduling for Data Center Networks, Mohammad Al-Fares, Sivasankar Radhakrishnan, Barath Raghavan, Nelson Huang, and Amin Vahdat, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010. (Test of Time Award).

Carousel: Scalable Logging for Intrusion Prevention Systems, Terry Lam, Michael Mitzenmacher, and George Varghese, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.

SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies, Jayaram Mudigonda, Praveen Yalagandula, Mohammad Al-Fares, and Jeffrey C. Mogul, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.

Reverse Traceroute, Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay Kumar Adhikari, Colin Scott, Justine Sherry, Peter van Wesep, Thomas Anderson, and Arvind Krishnamurthy, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010. (Award paper).

EndRE: An End-System Redundancy Elimination Service for Enterprises, Bhavish Aggarwal, Aditya Akella, Ashok Anand, Pushkar Chitnis, Chitra Muthukrishnan, Athula Nair, Ramachandran Ramjee, and George Varghese, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.

Operator and Radio Resource Sharing in Multi-Carrier Environments, Pongsakorn Teeraparpwong, Per Johansson, Harsha V. Madhyastha, and Amin Vahdat, Proceedings of the 12th IEEE/IFIP Network Operations and Management Symposium (NOMS'10), April 2010.

Towards a Proximal Resource-based Architecture to Support Augmented Reality Applications, Cynthia Taylor and Joseph Pasquale, Proceedings of the Workshop on Cloud-Mobile Convergence for Virtual Reality (CMCVR), Waltham, MA, March 2010.

Neon: System Support for Derived Data Management, Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Pittsburgh, PA, March 2010, pages 63-74.

Leaping Multiple Headers in a Single Bound: Wire Speed Parsing using the Kangaroo System, Christos Kozanitis, John Huber, Sushil Singh, and George Varghese, Proceedings of the IEEE Infocom Conference, San Diego, CA, March 2010.

Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces, Fragkiskos Papadopoulos, Dmitri Krioukov, Marian Boguna, and Amin Vahdat, Proceedings of the IEEE Infocom Conference, San Diego, CA, March 2010.

SherLog: Error Diagnosis by Connecting Clues from Run-time Logs, Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuanyuan Zhou, and Shankar Pasupathy, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Pittsburgh, PA, March 2010.

Botnet Judo: Fighting Spam with Itself, Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.

Covenant: An Architecture for Cooperative Scheduling in 802.11 Wireless Networks, Iswhar Ramani, Ramana Rao Kompella, Sriram Ramabhadran, and Alex C. Snoeren, IEEE Transactions on Wireless Communications 9(1), January 2010.

Towards Decoupling Storage and Computation in Hadoop with SuperDataNodes, George Porter, ACM SIGOPS Operating Systems Review 44(2):41-46, April 2010.

2009

Cumulus: Filesystem Backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, ACM Transaction on Storage 5(4):1-28, December 2009.

mPlane: An Architecture For Scalable Fault Localization, Ramana Rao Kompella, Alex C. Snoeren, and George Varghese, Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet, Rome, Italy, December 2009.

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, November 2009. (Test of Time Award).

When Private Keys are Public: Results from the 2008 Debian OpenSSL Debacle, Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference (IMC), Chicago, IL, November 2009.

The Importance of Being Overheard: Throughput Gains in Wireless Mesh Neworks, Mikhail Afanasyev and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), Chicago, IL, November 2009.

Moving Beyond End-to-End Path Information to Optimize CDN Performance, Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, and Jie Gao, Proceedings of the ACM Internet Measurement Conference (IMC), Chicago, IL, November 2009. (Best paper).

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering, Robert Beverly, Arthur Berger, Young Hyun, and k claffy, Proceedings of the ACM Internet Measurement Conference (IMC), Chicago, IL, November 2009.

I Seek Uou: Searching and Matching Individuals in Social Networks, Marti Motoyama and George Varghese, Proceedings of the ACM Workshop on Web Information and Data Management (WIDM), November 2009.

Evaluating the Impact of Inaccurate Information in Utility-Based Scheduling, Alvin AuYoung, Amin Vahdat, and Alex C. Snoeren, Proceedings of the ACM Conference on High Performance Computing and Networking, Portland, OR, November 2009.

Two Auction-Based Resource Allocation Environments: Design and Experience, Alvin AuYoung, Phil Buonadonna, Brent N. Chun, Chaki Ng, David C. Parkes, Jeff Shneidman, Alex C. Snoeren, and Amin Vahdat, In Market Oriented Grid and Utility Computing. Rajkumar Buyya and Kris Bubendorfer, editor. Wiley, 2009.

Pitfalls for ISP-friendly P2P Design, Michael Piatek, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, and Thomas Anderson, Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, NY, October 2009.

GT: picking up the truth from the ground for Internet traffic, F. Rgringoli, L. Salgarelli, M. Dusa, N. Cascarano, F. Risso, and k claffy, ACM SIGCOMM Computer Communication Review 39(5), October 2009.

PRES: Probabilistic Replay with Execution Sketching on Multiprocessors, Soyeon Park, Weiwei Xiong, Zuoning Yin, Rini Kaushik, Kyu H. Lee, Shan Lu, and Yuanyuan Zhou, Proceedings of the 22th ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, October 2009.

Curvature and Temperature of Complex Networks, Dmitri Krioukov, Fragkiskos Papadopoulos, Amin Vahdat, and Marián Boguñá, Physical Review E 80(3):035101, September 2009.

SAM: Enabling Practical Spatial Multiple Access in Wireless LAN, Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang, Mi Chen, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Beijing, China, September 2009.

Spamalytics: An Empirical Analysis of Spam Marketing Conversion, Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Communications of the Association for Computing Machinery 52(9):99-107, September 2009.

Graph Annotations in Modeling Complex Network Topologies, Xenofontas Dimitropoulos, Dmitri Krioukov, Amin Vahdat, and George Riley, Transactions on Modeling and Computer Simulation 19(4), September 2009.

Every Microsecond Counts: Tracking Fine-Grain Latencies with a Lossy Difference Aggregator, Ramana Rao Kompella, Kirill Levchenko, Alex C. Snoeren, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.

PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric, Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.

Detailed Diagnosis in Enterprise Networks, Srikanth Kandula, Ratul Mahajan, Patrick Verkaik, Sharad Agarwal, Jitu Padhye, and Paramvir Bahl, Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.

Cumulus: Filesystem Backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, USENIX ;login: 34(4):7-13, August 2009.

Data Center Switch Architecture in the Age of Merchant Silicon, Nathan Farrington, Erik Rubow, and Amin Vahdat, Proceedings of the IEEE Symposium on Hot Interconnects, August 2009.

GrassRoots: Socially-Driven Web Sites for the Masses, Frank Uyeda, Diwaker Gupta, Amin Vahdat, and George Varghese, Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.

MobiClique Middleware for Mobile Social Networking, Anna-Kaisa Pietilainen, Earl Oliver, Jason LeBrun, George Varghese, and Christophe Diot, Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.

CrossTalk: Scalably Interconnecting Instant Messenger Networks, Marti Motoyama and George Varghese, Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.

Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default, Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall, Privacy Enhancing Technologies Symposium, Seattle, Washington, August 2009.

Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage, Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, and Hovav Shacham, Proceedings of EVT 2009, Montreal, Canada, July 2009.

Storage System Problem Troubleshooting and System Logs, Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, and Yuanyuan Zhou, USENIX ;login: 34(3), June 2009.

Realistic and Responsive Network Traffic Generation, Kashi Vishwanath and Amin Vahdat, IEEE/ACM Transactions on Networking 17(3):712-725, June 2009.

Secure and Policy-Compliant Source Routing, Barath Raghavan, Patrick Verkaik, and Alex C. Snoeren, IEEE/ACM Transactions on Networking 17(3):764-777, June 2009.

Towards Low Latency State Machine Replication for Uncivil Wide-area Networks, Yanhua Mao, Flavio P. Junqueira, and Keith Marzullo, Fifth Workshop on Hot Topics in System Dependability (HotDep), Estoril, Lisbon, Portugal, June 2009.

Identifying Suspicious URLs: An Application of Large-Scale Online Learning, Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Conference on Machine Learning, Montreal, Canada, June 2009, pages 681-688.

Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs, Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Paris, France, June 2009, pages 1245-1254.

Defending Mobile Phones from Proximity Malware, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, and Per Johansson, Proceedings of the IEEE Infocom Conference, Rio de Janeiro, Brazil, April 2009, pages 1503-1511.

Greedy Forwarding in Scale-Free Networks Embedded in Hyperbolic Metric Spaces, Dmitri Krioukov, Fragkiskos Papadopoulos, Marian Boguna, and Amin Vahdat, 11th ACM SIGMETRICS Workshop on Mathematical Performance Modeling and Analysis, June 2009.

Spamcraft: An Inside Look at Spam Campaign Orchestration, Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, April 2009, pages 4:1-4:9.

Difference Engine, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, USENIX ;login: 34(2):24-31, April 2009.

Softspeak: Making VoIP Play Well in Existing 802.11 Deployments, Patrick Verkaik, Yuvraj Agarwal, Rajesh Gupta, and Alex C. Snoeren, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.

iPlane Nano: Path Prediction for Peer-to-Peer Applications, Harsha V. Madhyastha, Ethan Katz-Bassett, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.

Somniloquy: Augmenting Network Interfaces to Reduce PC Energy Usage, Yuvraj Agarwal, Ranveer Chandra, Steve Hodges, James Scott, Paramvir Bahl, and Rajesh Gupta, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.

Cimbiosys: A platform for content-based partial replication, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Meg Walraed-Sullivan, Ted Wobber, Cathy Marshall, and Amin Vahdat, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.

NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge, Bhavish Aggarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, and Geoffrey M. Voelker, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 349-364.

Sora: High Performance Software Radio Using General Purpose Multi-core Processors, Kun Tan, Jiansong Zhang, Haitao Wu, Fang Ji, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Wei Wang, and Geoffrey M. Voelker, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 75-90. (Award paper and Test of Time award).

Short Paper: Improving the Responsiveness of Internet Services with Automatic Cache Placement, Alexander Rasmussen, Emre Kiciman, Benjamin Livshits, and Madanlal Musuvathi, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Nuremberg, Bermany, March 2009.

Memory Resource Allocation for File System Prefetching -- From a Supply Chain Management Perspective, Zhe Zhang, Amit Kulkarni, Xiaosong Ma, and Yuanyuan Zhou, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Nuremberg, Bermany, March 2009.

CTrigger: Exposing Atomicity Violation Bugs from Their Hiding Places, Soyeon Park, Shan Lu, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Washington, DC, March 2009.

Efficient On-line Validation with Delta Execution, Joseph Tucek, Weiwei Xiong, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Washington, DC, March 2009.

Live Debugging of Distributed Systems, Darren Dao, Jeannie Albrecht, Charles Killian, and Amin Vahdat, Proceedings of the International Conference on Compiler Construction, March 2009.

Detecting Malicious Packet Losses, Alper Mizrak, Stefan Savage, and Keith Marzullo, IEEE Transactions on Parallel and Distributed Systems 20(2), February 2009.

Understanding Customer Problem Troubleshooting from Storage System Logs, Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Zhenmin Li, and Yuanyuan Zhou, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009, pages 43-56.

Cumulus: Filesystem Backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009, pages 225-238.

MPIWiz: Subgroup Reproducible Replay of MPI Applications, Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Wenguang Chen, Weimin Zheng, Zheng Zhang, and Geoffrey M. Voelker, Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), Raleigh, North Carolina, USA, February 2009, pages 251-260.

Towards Decoupling Storage and Computation in Hadoop with SuperDataNodes, George Porter, Proceedings of the International Workshop on Large-Scale Distributed Systems and Middleware (LADIS), Big Sky, MT, October 2009.

2008

Difference Engine: Harnessing Memory Redundancy in Virtual Machines, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, Proceedings of the 8th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, December 2008, pages 309-322. (Award paper).

Mencius: Building Efficient Replicated State Machines for WANs, Yanhua Mao, Flavio Junqueira, and Keith Marzullo, Proceedings of the 8th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, December 2008.

Towards Automatic Inference of Task Hierarchies in Complex Systems, Haohui Mai, Chongnan Gao, Xuezheng Liu, Xi Wang, and Geoffrey M. Voelker, Fourth Workshop on Hot Topics in System Dependability (HotDep), San Diego, CA, USA, December 2008, pages 7:1-7:6.

Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices, Hyun-chil Kim, k claff, Marino Fomenkov, Dhiman Barman, Michalis Faloutsos, and KiYoung Lee, Proceedings of ACM CoNEXT, Madrid, Spain, December 2008.

Are Disks the Dominant Contributor for Storage Failures - A Comprehensive Study of Storage Subsystem Failure Characteristics, Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, and Arkady Kanevsky, ACM Transaction on Storage 4(3), November 2008.

Spamalytics: an Empirical Analysis of Spam Marketing Conversion, Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2008, pages 3-14.

Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding, Benjamin Laxton, Kai Wang, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2008.

When Good Instructions Go Bad: Generalizing Return-oriented Programming to the SPARC, Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2008.

Analysis of a Mixed-Use Urban WiFi Network: When Metropolitan becomes Neapolitan, Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference (IMC), Vouliagmeni, Greece, October 2008, pages 85-98.

Design and Implementation Tradeoffs for Wide-Area Resource Discovery, Jeannie Albrecht, David Oppenheimer, David Patterson, and Amin Vahdat, ACM Transactions on Internet Technology (TOIT) 8(4), Sep 2008.

XL: An Efficient Network Routing Algorithm, Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008.

A Scalable, Commodity, Data Center Network Architecture, Mohammad Al-Fares, Alex Loukissas, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008. (Test of Time Award).

Storm: When Researchers Collide, Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, and Kirill Levchenko, USENIX ;login: 33(4):6-13, August 2008.

Flexible Resource Allocation and Composition Across GSM/3G Networks and WLANs, Mohammad Al-Fares, Martin Johnsson, Per Johansson, and Amin Vahdat, Proceedings of the International Workshop on Mobility in the Evolving Internet Architecture (MobiArch), August 2008.

Google's Deep-Web Crawl, Jayant Madhavan, David Ko, Lucja Kot, Vignesh Ganapathy, Alexander Rasmussen, and Alon Halevy, Proceedings of the 34th Internation Conference on Very Large Data Bases (VLDB), Auckland, New Zealand, August 2008.

Ad-Hoc Data Processing in the Cloud (demo), Dionysios Logothetis and Ken Yocum, Proceedings of the 34th Internation Conference on Very Large Data Bases (VLDB), Auckland, New Zealand, August 2008.

AutoISES: Automatically Inferring Security Specifications and Detecting Violations, Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, and Yuanyuan Zhou, Proceedings of the 17th USENIX Security Symposium, San Jose, CA, August 2008.

Trace-based Microarchitecture-level Diagnosis of Permanent Hardware Faults, Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, and Yuanyuan Zhou, Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Anchorage, AK, June 2008, pages 22-31.

Using Likely Program Invariants to Detect Hardware Errors, Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, and Yuanyuan Zhou, Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Anchorage, AK, June 2008, pages 70-79.

Evaluating Distributed Systems: Does Background Traffic Matter?, Kashi Vishwanath and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2008.

Wide-Scale Data Stream Management, Dionysios Logothetis and Ken Yocum, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2008.

Improving Scalability and Fault Tolerance in an Application Management Infrastructure, Nick Topilski, Jeannie Albrecht, and Amin Vahdat, Proceedings of the USENIX Workshop on Large-Scale Computing (LASCO), Boston, MA, June 2008.

Automatic Request Categorization in Internet Services, Abhishek Sharma, Ranjita Bhagwan, Monojit Choudhury, Leana Golubchik, Ramesh Govindan, and Geoffrey M. Voelker, Proceedings of the First Workshop on Hot Topics in Measurement and Modeling of Computer Systems (HotMetrics), Annapolis, MD, June 2008.

CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining, Ding Yuan, Kyuhyung Lee, Hong Cheng, Gopal Krishna, Zhenmin Li, Xiao Ma, Yuanyuan Zhou, and Jiawei Han, Proceedings of the 2008 SIAM International Conference on Data Mining, April 2008.

DieCast: Testing Distributed Systems with an Accurate Scale Model, Diwaker Gupta, Kashi Vishwanath, and Amin Vahdat, Proceedings of the 5th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, April 2008.

Efficiency through Eavesdropping: Link-layer Packet Caching, Mikhail Afanasyev, David G. Andersen, and Alex C. Snoeren, Proceedings of the 5th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, April 2008.

On the Spam Campaign Trail, Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.

The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.

Banal: Because Format Checking Is So Trite, Geoffrey M. Voelker, Proceedings of USENIX Workshop on Organizing Workshops, Conferences and Symposia for Computer Systems (WOWCS), San Francisco, CA, April 2008.

Web Service Access Management for Integration with Agent Systems, Benno Overeinger, Patrick Verkaik, and Francis Brazier, Proceedings of ACM Symposium on Applied Computing (SAC), Forteleza, Ceara, Brazil, March 2008.

Detecting Compromised Routers via Packet Forwarding Behavior, Alper Mizrak, Stefan Savage, and Keith Marzullo, IEEE Network 22(2), March 2008.

Learning from Mistakes --- A Comprehensive Study on Real World Concurrency Bug Characteristics, Shan Lu, Soyeon Park, Eunsoo Seo, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Seattle, WA, March 2008.

Understanding the propagation of hard faults to software and its implications on Resilient Systems Design, Man-Lap Li, Pradeep Ramachandran, Sarita Adve, Vikram Adve, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Seattle, WA, March 2008.

Dual Frame Motion Compensation with Uneven Quality Assignment, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, IEEE Transactions on Circuits and Systems for Video Technology 18(2):249-256, February 2008.

Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics, Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, and Arkady Kanevsky, Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2008, pages 111-125.

High Bandwidth Data Dissemination for Large-scale Distrbuted Systems, Dejan Kostić, Alex C. Snoeren, Amin Vahdat, Ryan Braud, Charles Killian, Jeannie Albrecht, James W. Anderson, Adolfo Rodriguez, and Erik VandeKieft, ACM Transactions on Computer Systems 26(1), February 2008.

Remote Control: Distributed Application Configuration, Management, and Visualization with Plush, Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, USENIX ;login: 33(1), February 2008.

Specificity rule discovery in HIV-1 protease cleavage site analysis, Hyeoncheol Kim, Yiying Zhang, Yong-Seok Heo, Heung-Bum Oh, and Su-Shing Chen, Computational Biology and Chemistry 32(1):72-79, February 2008.

2007

Curing Regular Expressions Matching Algorithms from Insomnia, Amnesia, and Acalculia, Sailesh Kumar, Balakrishnan Chandrasekaran, Jonathan S. Turner, and George Varghese, Proceedings of the ACM/IEEE Symposium on Architecture for Networking and Communications Systems (ANCS), Orlando, FL, December 2007.

Can You Infect Me Now? Malware Propagation in Mobile Phone Networks, Chris Fleizach, Michael Liljenstam, Per Johansson, Geoffrey M. Voelker, and András Méhes, Proceedings of the ACM Workshop on Recurring Malcode (WORM), Washington D.C., November 2007.

Usher: An Extensible Framework for Managing Clusters of Virtual Machines, Marvin McNett, Diwaker Gupta, Amin Vahdat, and Geoffrey M. Voelker, Proceedings of the 21st USENIX Large Installation System Administration Conference (LISA), Dallas, TX, November 2007.

/* iComment: Bugs or Bad Comments? */, Lin Tan, Ding Yuan, Gopal Krishna, and Yuanyuan Zhou, Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.

MUVI: Automatically Inferring Multi-Variable Access Correlations and Detecting Related Semantic and Concurrency Bugs, Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, and Yuanyuan Zhou, Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.

Triage: Diagnosing Production Run Failures at the User's Site, Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, and Yuanyuan Zhou, Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.

10 network papers that changed the world, George Varghese, ACM SIGCOMM Computer Communication Review 37(5), October 2007.

Remote Control: Distributed Application Configuration, Management, and Visualization with Plush, Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 21st USENIX Large Installation System Administration Conference (LISA), Dallas, TX, November 2007.

An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants, Jason Franklin, Vern Paxson, Adrian Perrig, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2007.

The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86), Hovav Shacham, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2007.

Network Monitoring using Traffic Dispersion Graphs (TDGs), Marios Iliofotou, Prashanth Pappu, Michalis Faloutsos, Michael Mitzenmacher, Sumeet Singh, and George Varghese, Proceedings of the ACM Internet Measurement Conference (IMC), San Diego, CA, October 2007.

A study of interleaving coverage criteria, Shan Lu, Weihang Jiang, and Yuanyuan Zhou, Proceedings of the European Software Engineering Conference (ESEC) and ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), Dubrovnik, Croatia, September 2007, pages 533-536.

Comparison of the Three CPU Schedulers in Xen, Diwaker Gupta, Lucy Cherkasova, and Amin Vahdat, ACM SIGMETRICS Performance Evaluation Review (PER) 35(2):42-51, September 2007.

Cross-component Energy Management: Joint Adaptation of Processor and Memory, Xiaodong Li, Ritu Gupta, Sarita V. Adve, and Yuanyuan Zhou, ACM Transactions on Architecture and Code Optimization 4(3), September 2007.

Slicing Spam with Occam's Razor, Chris Fleizach, Geoffrey M. Voelker, and Stefan Savage, Proceedings of Conference on Email and Anti-Spam (CEAS), Mountain View, CA, August 2007.

Orbis: Rescaling Degree Correlations to Generate Annotated Internet Topologies, Priya Mahadevan, Calvin Hubble, Bradley Huffaker, Dimitri Krioukov, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.

Cloud Control with Distributed Rate Limiting, Barath Raghavan, Kashi Vishwanath, Sriram Ramabhadran, Kenneth Yocum, and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007. (Best student paper).

Automating Cross-Layer Diagnosis of Enterprise Wireless Networks, Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.

Spamscatter: Characterizing Internet Scam Hosting Infrastructure, David S. Anderson, Chris Fleizach, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.

Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks, Periklis Akritidis, Chin Wee Yung, Vinh The Lam, Stelios Sidiroglou, and Kostas G. Anagnostakis, Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.

Wresting Control from BGP: Scalable Fine-grained Route Control, Patrick Verkaik, Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren, and Jacobus van der Merwe, Proceedings of the USENIX Annual Technical Conference, Santa Clara, CA, June 2007, pages 295-308.

Detection and Localization of Network Black Holes, Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren, Proceedings of the IEEE Infocom Conference, Anchorage, AK, May 2007, pages 2180-2188.

A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock, Baruch Awerbuch, Shay Kutten, Yishay Mansour, Boaz Patt-Shamir, and George Varghese, IEEE Transactions on Dependable and Secure Computing 4(3), July 2007.

Managing Energy-Performance Tradeoffs for Multithreaded Applications on Multiprocessor Architectures, Soyeon Park, Weihang Jiang, Yuanyuan Zhou, and Sarita Adve, Proceedings of the ACM SIGMETRICS Conference, San Diego, CA, USA, June 2007.

Enhancing Game-Server AI with Distributed Client Computation, John Douceur, Jacob Lorch, Frank Uyeda, and Randall Wood, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), San Francisco, CA, June 2007.

Delta Execution for Software Reliability, Yuanyuan Zhou, Darko Marinov, William Sanders, Craig Zilles, Marcelo d'Amorim, Steven Lauterburg, Ryan M. Lefever, and Joseph Tucek, Third Workshop on Hot Topics in System Dependability (HotDep), Edinburgh, UK, June 2007.

Classic Paxos vs. Fast Paxos: Caveat Emptor, Flavio Junqueira, Yanhua Mao, and Keith Marzullo, Third Workshop on Hot Topics in System Dependability (HotDep), Edinburgh, UK, June 2007.

Mace: Language Support for Building Distributed Systems, Charles Killian, James W. Anderson, Ryan Braud, Ranjit Jhala, and Amin Vahdat, Proceedings of Programming Languages Design and Implementation (PLDI), June 2007.

How to Design Computer Security Experiments, Sean Peisert and Matt Bishop, World Conference on Information Security Education (WISE), June 2007.

Improving Wireless Access of Video Over the Internet, Jesse Steinberg and Joseph Pasquale, Proceedings of the Third International Conference on Networking and Services, Athens, Greece, June 2007.

Hotcomments: How to Make Program Comments More Useful?, Lin Tan, Ding Yuan, and Yuanyuan Zhou, Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HotOS-XI), San Diego, CA, May 2007.

X-Trace: A Pervasive Network Tracing Facility, Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, and Ion Stoica, Proceedings of the 4th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, April 2007. (Test of Time Award).

Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code, Charles Killian, James W. Anderson, Ranjit Jhala, and Amin Vahdat, Proceedings of the 4th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, April 2007. (Award paper).

Toward Models for Forensic Analysis, Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), Seattle, WA, April 2007.

Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons, Barath Raghavan, Saraubh Panjwani, and Anton Mityagin, ACM SIGCOMM Computer Communication Review 37(2), April 2007.

Analysis of Computer Intrusions using Sequences of Function Calls, Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing 4(2):137-150, April 2007.

Achieving Efficiency and Accuracy in the ALPS Application-level Proportional-share Scheduler, Travis Newhouse and Joseph Pasquale, Journal of Grid Computing 5(2):251-270, March 2007.

A Performance Analysis of Indirect Routing, Joshua Opos, Sriram Ramabhadran, Andrew Terry, Joe Pasquale, Alex C. Snoeren, and Amin Vahdat, Proceedings of the IEEE International Parallel and Distributed Processing Symposium, Long Beach, CA, March 2007.

A Resource Allocation Problem in Replicated P2P Storage Systems, Sriram Ramabhadran and Joseph Pasquale, Fourth International Workshop on Hot Topics in Peer-to-Peer Systems (Hot-P2P), Long Beach, CA, March 2007.

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms, Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, and Dawn Song, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Lisbon, Portugal, March 2007.

On Scalable Attack Detection in the Network, Ramana Rao Kompella, Sumeet Singh, and George Varghese, IEEE/ACM Transactions on Networking 15(1), February 2007.

HARD: Hardware-Assisted Lockset-based Race Detection, Pin Zhou, Radu Teodorescu, and Yuanyuan Zhou, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Phoenix, AZ, February 2007, pages 121-132.

Scaling Peer-to-Peer Games in Low-Bandwidth Environments, Jeffrey Pang, Frank Uyeda, and Jacob Lorch, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Bellvue, WA, February 2007.

Modeling and Generating Realistic Streaming Media Server Workloads , Wenting Tang, Yun Fu, and Amin Vahdat, Computer Networks 51(1):336-356, January 2007.

AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants, Shan Lu, Joseph Tucek, Feng Qin, and Yuanyuan Zhou, IEEE MICRO 27(1):26-35, January 2007.

Declarative Resource Naming for Macroprogramming Wireless Networks of Embedded Systems, Chalermek Intanagonwiwat, Rajesh Gupta, and Amin Vahdat, Lecture Notes in Computer Science 4240/2006:192-199, January 2007.

2006

PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection, Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, and Josep Torrellas, Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Orlando, FL, December 2006.

LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks, Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yuanyuan Zhou, and Youfeng Wu, Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Orlando, FL, December 2006, pages 135-148.

A Study of End-to-End Web Access Failures, Venkata N. Padmanabhan, Sriram Ramabhadran, Sharad Agarwal, and Jitendra Padhye, Proceedings of CoNEXT, Lisboa, Portugal, December 2006.

Characterization of a Large Web Site Population with Implications for Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, World Wide Web Journal 9(4):505-536, December 2006.

Maximizing Data Locality in Distributed Systems, Fan Chung, Ronald Graham, Ranjita Bhagwan, Geoffrey M. Voelker, and Stefan Savage, Journal of Computer and System Sciences 72(8), December 2006.

The Stratified Round Robin Scheduler: Design, Analysis and Implementation, Sriram Ramabhadran and Joseph Pasquale, IEEE/ACM Transactions on Networking, December 2006.

Optimizing Grid Site Manager Performance with Virtual Machines, Ludmila Cherkasova, Diwaker Gupta, Eygene Ryabinkin, Roman Kurakin, Vladimir Dobretsov, and Amin Vahdat, Proceedings of the 3rd USENIX Workshop on Real, Large Distributed Systems (WORLDS), Seattle, WA, December 2006.

Decongestion Control, Barath Raghavan and Alex C. Snoeren, Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006, pages 61-66.

Service Portability: Why HTTP Redirect is the Model for the Future, Sumeet Singh, Scott Shenker, and George Varghese, Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006.

Glavlit: Preventing Exfiltration at Wire Speed, Nabil Schear, Carmelo Kintana, Qing Zhang, and Amin Vahdat, Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006.

Fast packet classification for two-dimensional conflict-free filters, Florin Baboescu, Priyank Ramesh Warkhede, Subhash Suri, and George Varghese, Computer Networks 50(11):1831-1842, November 2006.

Parallelism versus Memory Allocation in Pipelined Router Forwarding Engines, Fan Chung, Ronald Graham, Jia Mao, and George Varghese, Theory of Computing Systems 39(6), November 2006.

Enforcing Performance Isolation Across Virtual Machines in Xen, Diwaker Gupta, Ludmila Cherkasova, and Amin Vahdat, Proceedings of the ACM/IFIP/USENIX Middleware Conference, Melbourne, Australia, November 2006.

Asgard: Software Guards for System Address Spaces, Martin Abadi, Mihiai Budiu, Ulfar Erlingsson, George Necula, and Michael Vrable, Proceedings of the 7th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Seattle, WA, November 2006.

Automatic Online Failure Diagnosis at the End-User Site, Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, and Yuanyuan Zhou, Second Workshop on Hot Topics in System Dependability (HotDep), Seattle, WA, USA, November 2006.

AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants, Shan Lu, Joe Tucek, Feng Qin, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), San Jose, CA, October 2006.

Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure, Periklis Akritidis, Chin Wee Yung, Vinh The Lam, Stelios Sidiroglou, and Kostas G. Anagnostakis, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2006.

Bitmap algorithms for counting active flows on high-speed links, Cristian Estan, George Varghese, and Michael E. Fisk, IEEE/ACM Transactions on Networking 14(5):925-937, October 2006.

Unexpected Means of Identifying Protocols, Justin Ma, Kirill Levchenko, Cristian Kriebich, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.

Finding Diversity in Remote Code Injection Exploits, Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, October 2006.

Source and channel coding trade-offs for a pulsed quality video encoder, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the 40th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, October 2006.

An Improved Construction for Counting Bloom filters, Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, and George Varghese, Proceedings of the European Symposium on Algorithms (ESA), Zurich, SWitzerland, September 2006.

Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis, Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006, pages 39-50.

Systematic Topology Analysis and Generation Using Degree Correlations, Priya Mahadevan, Dmitri Krioukov, Kevin Fall, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.

Detecting Evasion Attacks at High Speeds without Reassembly, George Varghese, Andy Fingerhut, and Flavio Bonomi, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.

Realistic and Responsive Network Traffic Generation, Kashi Vishwanath and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.

Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines, Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.

PRIMED: Community-of-Interest-Based DDoS Mitigation, Patrick Verkaik, Oliver Spatscheck, Jacobus van der Merwe, and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Workshop on Large Scale Attack Defense, Pisa, Italy, September 2006, pages 147-154.

Fatih: Detecting and Isolating Malicious Routers via Traffic Validation, Alper Mizrak, Yu-Chung Cheng, Keith Marzullo, and Stefan Savage, IEEE Transactions on Dependable and Secure Computing 3(3), July 2006.

Replicating Nondeterministic Services on Grid Environments, Xianan Zhang, Flavio Junqueira, Matti Hitunen, Keith Marzullo, and Rick Schlichting, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.

ALPS: An Application-Level Proportional-Share Scheduler, Travis Newhouse and Joseph Pasquale, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.

Service Contracts and Aggregate Utility Functions, Alvin AuYoung, Laura Grit, Janet Wiener, and John Wilkes, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.

Loose Synchronization for Large-Scale Networked Systems, Jeannie Albrecht, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2006, pages 301-314.

Service Placement in Shared Wide-Area Platforms, David Oppenheimer, Brent Chun, David Patterson, Alex C. Snoeren, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2006, pages 273-288.

Distributed Network Querying with Bounded Approximate Caching, Badrish Chandramouli, Jun Yang, and Amin Vahdat, 11th International Conference on Database Systems for Advanced Applications (DASFAA), June 2006.

Predictability of Rules in HIV-1 Protease Cleavage Site Analysis, Hyeoncheol Kim, Tae-Sun Yoon, Yiying Zhang, Anupam Dikshit, and Su-Shing Chen, Proceedings of the 2006 International Conference on Computational Science (ICCS), University of Reading, UK, May 2006.

Inferring Internet Denial-of-Service Activity, David Moore, Colleen Shannon, Doug Brown, Geoffrey M. Voelker, and Stefan Savage, ACM Transactions on Computer Systems 24(2):115-139, May 2006.

WAP5: Black-box Performance Debugging for Wide-Area Systems, Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Marcos K. Aguilera, and Amin Vahdat, Proceedings of the 15th International World Wide Web Conference, May 2006.

To Infinity and Beyond: Time-Warped Network Emulation, Diwaker Gupta, Kenneth Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, and Geoffrey M. Voelker, Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, May 2006, pages 87-100.

Pip: Detecting the Unexpected in Distributed Systems, Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Mehul A. Shah, Charles Killian, and Amin Vahdat, Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, May 2006. (Test of Time Award).

ReAgents: Behavior-based Remote Agents and Their Performance, Eugene Hung and Joseph Pasquale, Fifth International Joint Conference on Autonomous Agents amp; MultiAgent Systems, Hakodate, Japan, May 2006.

MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks, Priya Mahadevan, Adolfo Rodriguez, David Becker, and Amin Vahdat, Mobile Computing and Communications Review (MC2R), April 2006.

Analysis of Long-Running Replicated Systems, Sriram Ramabhadran and Joseph Pasquale, Proceedings of the IEEE Infocom Conference, Barcelona, Spain, April 2006.

CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code, Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou, IEEE Transactions on Software Engineering 32(3):176-192, March 2006.

On Object Maintenance in Peer-to-Peer Systems, Kiran Tati and Geoffrey M. Voelker, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Santa Barbara, CA, February 2006.

DMA-aware memory energy management, Vivek Pandey, Weihang Jiang, Yuanyuan Zhou, and Ricardo Bianchini, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Austin, TX, February 2006, pages 133-144.

Wireless Security and Internetworking, Minho Shin, Justin Ma, Arunesh Mishra, and William A. Arbaugh, Proceedings of the IEEE 94(2), February 2006.

Multiple Job Scheduling in a Connection-Limited Data Parallel System, Alessandro Amoroso and Keith Marzullo, IEEE Transactions on Parallel and Distributed Systems 17(2):125-134, February 2006.

The Costs and Limits of Availability for Replicated Services, Haifeng Yu and Amin Vahdat, ACM Transactions on Computer Systems 24(2):70-113, February 2006.

PlanetLab Application Management Using Plush, Jeannie Albrecht, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, ACM SIGOPS Operating Systems Review 40(1):33-40, January 2006.

Experiences With Resource Allocators for Large-Scale Multiuser Testbeds, Robert Ricci, David Oppenheimer, Jay Lepreau, and Amin Vahdat, ACM SIGOPS Operating Systems Review 40(1):41-48, January 2006.

The Internet AS-Level Topology: Three Data Sources and One Definiteve Metric, Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitripoulos, kc claffy, and Amin Vahdat, ACM SIGCOMM Computer Communication Review, January 2006.

Self Managed Systems and Services: Effective Web Service Load Balancing Through Statistical Monitoring, George Porter and Randy H. Katz, Communications of the Association for Computing Machinery 49(3):48-54, March 2006.

2005

Opportunistic Measurement: Extracting Insight from Spurious Traffic, Martin Casado, Tal Garfinkel, Weidong Cui, Vern Paxson, and Stefan Savage, Proceedings of the 4th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, November 2005.

Cross-layer Visibility as a Service, Ramana Rao Kompella, Albert Greenberg, Jennifer Rexford, Alex C. Snoeren, and Jennifer Yates, Proceedings of the 4th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, November 2005.

ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing, Smruti R. Sarangi, Wei Liu, Josep Torrellas, and Yuanyuan Zhou, Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Barcelona, Spain, November 2005.

Self-stopping Worms, Justin Ma, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington D.C., November 2005, pages 12-21.

Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse, Rob Sherwood, Bobby Bhattacharjee, and Ryan Braud, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2005.

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik VandeKieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005, pages 148-162.

Rx: Treating Bugs as Allergies---a Safe Method to Survive Software Failure, Feng Qin, Joe Tucek, Jagadeesan Sundaresan, and Yuanyuan Zhou, Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005. (Award paper).

Hibernator: Helping Disk Arrays Sleep through the Winter, Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberley Keeton, and John Wilkes, Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.

TIE Breaking: Tunable Interdomain Egress Selection, Renata Teixeira, Tim Griffin, Mauricio G. C. Resende, and Jennifer Rexford, Proceedings of CoNEXT, Toulouse, France, October 2005.

The Power of Slicing in Internet Flow Measurement, Ramana Rao Kompella and Cristian Estan, Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), New Orleans, LA, October 2005.

Java Active Extensions: Scalable Middleware for Performance-Isolated Remote Execution, Travis Newhouse and Joseph Pasquale, Elsevier Computer Communications Journal 28(14):1680-1691, September 2005.

Principles-Driven Forensic Analysis, Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, September 2005.

Coterie Availability in Sites, Flavio Junqueira and Keith Marzullo, Proceedings of the International Symposium on Distributed Computing (DISC), Cracow, Poland, September 2005.

PR-Miner: Automatically Extracting Implicit Programming Rules and Detecting Violations in Large Software Code, Zhenmin Li and Yuanyuan Zhou, ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), September 2005.

Replication predicates for dependent-failure algorithms, Flavio P. Junqueira and Keith Marzullo, Proceedings of the 11th International Conference on Parallel and Distributed Computing (Euro-Par), August 2005. (Award paper).

Performance Directed Energy Management for Main Memory and Disks, Xiaodong Li, Zhenmin Li, Yuanyuan Zhou, and Sarita Adve, ACM Transaction on Storage 1(3):346-380, 2005.

A Case Study in Building Layered DHT Applications, Yatin Chawathe, Sriram Ramabhadran, Sylvia Ratnasamy, Anthony LaMarca, Joseph Hellerstein, and Scott Shenker, Proceedings of the ACM SIGCOMM Conference, Philadelphia, PA, August 2005.

Addressing Strategic Behavior in a Deployed Microeconomic Resource Allocator, Chaki Ng, Philip Buonadonna, Brent N. Chun, Alex C. Snoeren, and Amin Vahdat, Proceedings of the Third Workshop on Economics of Peer-to-Peer Systems, Philadelphia, PA, August 2005, pages 99-104.

Cooperative Packet Scheduling via Pipelining in 802.11 Wireless Networks, Ramana Rao Kompella, Sriram Ramabhadran, Ishwar Ramani, and Alex C. Snoeren, Proceedings of the Workshop on Experimental Approaches to Wireless Network Design and Analysis (E-WIND), Philadelphia, PA, August 2005, pages 35-40.

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network, Ju Wang, Xin Liu, and Andrew Chien, Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005.

Brief Announcement: The Overlay Network Content Distribution Problem, Chip Killian, Michael Vrable, Alex C. Snoeren, Amin Vahdat, and Joseph Pasquale, Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), Las Vegas, NV, July 2005, page 98.

Append-Only Signatures, Eike Kiltz, Anton Mityagin, Saurabh Panjwani, and Barath Raghavan, Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP), Lisboa, Portugal, July 2005.

Design and Implementation Tradeoffs for Wide-Area Resource Discovery, David Oppenheimer, Jeannie Albrecht, David Patterson, and Amin Vahdat, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Research Triangle Park, NC, July 2005.

Why Markets Could (But Don't Currently) Solve Resource Allocation Problems in Systems, Jeffrey Shneidman, Chaki Ng, David C. Parkes, Alvin AuYoung, Alex C. Snoeren, Amin Vahdat, and Brent N. Chun, Proceedings of the 10th USENIX Workshop on Hot Topics in Operating Systems (HotOS-X), Santa Fe, NM, June 2005, pages 37-42.

Treating Bugs as Allergies: A Safe Method for Surviving Software Failures, Feng Qin, Joseph Tucek, and Yuanyuan Zhou, Proceedings of the 10th USENIX Workshop on Hot Topics in Operating Systems (HotOS-X), Santa Fe, NM, June 2005.

The Virtue of Dependent Failures in Multi-site Systems, Flavio Junqueira and Keith Marzullo, Proceedings of the IEEE Workshop on Hot Topics in System Dependability (HotDep), Yokohama, Japan, June 2005.

Managing Self-inflicted Nondeterminism, Dmitrii Zagorodnov and Keith Marzullo, Proceedings of the IEEE Workshop on Hot Topics in System Dependability (HotDep), Yokohama, Japan, June 2005.

The Entropia Virtual Machine for Destop Grids, Brad Calder, Andrew Chien, Ju Wang, and Dan Yang, Proceedings of the ACM/USENIX Conference on Virtual Execution Environments (VEE), Chicago, IL, June 2005.

Fatih: Detecting and Isolating Malicious Routers, Alper Mizrak, Yu-Chung Cheng, Keith Marzullo, and Stefan Savage, Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, June 2005, pages 538-547. (Award paper).

A Tree-based Router Search Engine Architecture with Single Port Memories, Florin Baboescu, Dean Tullsen, Grigore Rosu, and Sumeet Singh, Proceedings of the 32nd International Symposium on Computer Architecture (ISCA), Madison, WI, June 2005.

MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks, Priya Mahadevan, Adolfo Rodriguez, David Becker, and Amin Vahdat, International Workshop on Wireless Traffic Measurements and Modeling, June 2005.

Accuracy Characterization for Metropolitan-scale Wi-Fi Localization, Yu-Chung Cheng, Yatin Chawathe, Anthony Lamarca, and John Krumm, Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Seattle, WA, June 2005.

Empirical Evaluation of Multi-level Buffer Cache Collaboration for Storage Systems, Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, and Berni Schiefer, Proceedings of the ACM SIGMETRICS Conference, Banff, Alberta, Canada, June 2005.

A Robust System for Accurate Real-time Summaries of Internet Traffic, Ken Keys, David Moore, and Christian Estan, Proceedings of the ACM SIGMETRICS Conference, Banff, Alberta, Canada, June 2005.

Mining Block Correlations to Improve Storage Performance, Zhenmin Li, Zhifeng Chen, and Yuanyuan Zhou, ACM Transaction on Storage 1(2):213-245, 2005.

Mirage: A Microeconomic Resource Allocation System for Sensornet Testbeds, Brent N. Chun, Philip Buonadonna, Alvin AuYoung, Chaki Ng, David C. Parkes, Jeffrey Shneidman, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 2nd IEEE Workshop on Embedded Networked Sensors (EmNetS-II), Sydney, Australia, May 2005, pages 19-28.

Power Aware Storage Cache Management, Qingbo Zhu and Yuanyuan Zhou, IEEE Transactions on Computers 54(5):587-602, May 2005.

IP Fault Localization Via Risk Modeling, Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren, Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, May 2005, pages 57-70.

Remote Physical Device Fingerprinting, Tadayoshi Kohno, Andre Brodio, and kc claffy, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2005. (Award paper).

Remote Physical Device Fingerprinting, Tadayoshi Kohno, Andre Brodio, and kc claffy, IEEE Transactions on Dependable and Secure Computing 2(2):93-108, April 2005.

Access and Mobility of Wireless PDA Users, Marvin McNett and Geoffrey M. Voelker, Mobile Computing and Communications Review (MC2R) 9(2):40-55, April 2005.

Maintaining High Bandwidth under Dynamic Network Conditions, Dejan Kostić, Ryan Braud, Charles Killian, Erik VandeKieft, James W. Anderson, Alex C. Snoeren, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, April 2005, pages 193-208.

Surviving Internet Catastrophes, Flavio Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, and Geoffrey M. Voelker, Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, April 2005.

Traffic Matrix Reloaded: Impact of Routing Changes, Renata Teixeira, Nick Duffield, and Jennifer Rexford, Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.

Comparison of Public End-to-end Bandwidth Estimation Tools on High-Speed Links, Alok Shriram, Margaret Murray, Young Hyun, Nevil Brownlee, Andre Broido, Marina Fomenkov, and kc claffy, Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.

A Study of Burstiness in TCP Flows, Srinivas Shakkotai, Nevil Brownlee, and kc claffy, Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.

Spectroscopy of traceroute Delays, Andre Brodio, Young Hyun, and kc claffy, Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.

Efficient and Flexible Architectural Support for Dynamic Monitoring, Yuanyuan Zhou, Pin Zhou, Feng Qin, Wei Liu, and Josep Torrellas, ACM Transaction on Architecture and Code Generation 2(1):3-33, March 2005.

SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks, Ishwar Ramani and Stefan Savage, Proceedings of the IEEE Infocom Conference, Miami, FL, March 2005.

Designing Incentives for Peer-to-Peer Routing, Alberto Blanc, Yi-Kai Liu, and Amin Vahdat, Proceedings of the IEEE Infocom Conference, Miami, FL, March 2005.

Error Concealment for Dual Frame Video Coding with Uneven Quality, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2005.

NetProfiler: Profiling Wide-Area Networks Using Peer Cooperation, Venkata Padmanabhan, Sriram Ramabhadran, and Jitu Padhye, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Ithaca, NY, February 2005.

Consistent and Automatic Replica Regeneration, Haifeng Yu and Amin Vahdat, ACM Transactions on Storage 1(1):3-37, February 2005.

Scalable Packet Classification, Florin Baboescu and George Varghese, IEEE/ACM Transactions on Networking 13(1), February 2005.

A Lower Bound for Multicast Key Distribution, Jack Snoeyink, Subhash Suri, and George Varghese, Computer Networks 47(3):429-441, February 2005.

SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs, Feng Qin, Shan Lu, and Yuanyuan Zhou, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, San Francisco, CA, February 2005.

MediaGuard: a Model-based Framework for Building Streaming Media Services, Ludmila Cherkasova, Wenting Tang, and Amin Vahdat, Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2005.

VI-Attached Database Storage, Yuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Dimitrios Xinidis, Cezary Dubnicki, and Kai Li, IEEE Transactions on Parallel and Distributed Systems 16(1):35-50, 2005.

Wireless Hotspots: Current Challenges and Future Directions, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Mobile Networks and Applications 10(3):265-274, January 2005.

Effective Small-site Web Load Balancing Through Statistical Monitoring, George Porter and Randy H. Katz, Proceedings of the IEEE/IFIP International Workshop on Self-Managed Systems and Services (SelfMan), Nice, France, May 2005.

COPS: Quality of Service vs. Any Service at All, Randy H. Katz, George Porter, Scott Shenker, Ion Stoica, and Mel Tsai, Proceedings of the International Workshop on Quality of Service (IWQoS), June 2005.

2004

Automated Worm Fingerprinting, Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage, Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, December 2004, pages 45-60.

CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code, Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou, Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, December 2004, pages 289-302.

FUSE: Lightweight Guaranteed Distributed Failure Notification, John Dunagan, Nicholas J. A. Harvey, Michael B. Jones, Dejan Kostić, Marvin Theimer, and Alec Wolman, Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, December 2004.

Distributed Resource Discovery on PlanetLab with SWORD, David Oppenheimer, Jeannie Albrecht, David Patterson, and Amin Vahdat, Proceedings of the ACM/USENIX Workshop on Real, Large Distributed Systems (WORLDS), San Francisco, CA, December 2004.

AccMon: Automatically Detecting Memory-related Bugs via Program Counter-based Invariants, Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel Midkiff, and Josep Torrellas, Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Portland, OR, December 2004.

iWatcher: Simple, General Architectural Support for Software Debugging, Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas, IEEE MICRO 24(6), December 2004.

Performance-Directed Energy Management for Storage Systems, Xiaodong Li, Zhenmin Li, Pin Zhou, Yuanyuan Zhou, Sarita Adve, and Sanjeev Kumar, IEEE MICRO 24(6), December 2004.

Packet-Dispersion Techniques and a Capacity-Estimation Methodology, Constantinos Dovrolis, Parameswaran Ramanathan, and David Moore, IEEE/ACM Transactions on Networking 12(6), December 2004.

Is P2P Dying or Just Hiding?, Thomas Karagiannis, Andre Brodio, Nevil Brownlee, kc claffy, and Michalis Faloutsos, Proceedings of the 9th IEEE Global Internet Symposium and Next Generation Networks(GlobeCom), Dallas, TX, November 2004.

On the Difficulty of Scalably Detecting Network Attacks, Kirill Levchenko, Ramamohan Paturi, and George Varghese, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Washington, D.C., October 2004.

On the Effectiveness of Address-Space Randomization, Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh, Proceedings of the ACM Conference on Computer and Communications Security (CCS), Washington, D.C., October 2004, pages 298-307.

The Top Speed of Flash Worms, Stuart Staniford, David Moore, Vern Paxson, and Nick Weaver, Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington, D.C., October 2004.

On Scalable Attack Detection in the Network, Ramana Rao Kompella, Sumeet Singh, and George Varghese, Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Taormina, Sicily, Italy, October 2004.

Transport Layer Identification of P2P Traffic, Thomas Karagiannis, Andre Brodio, Michalis Faloutsos, and kc claffy, Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Taormina, Sicily, Italy, October 2004.

Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation and Application, Yin Zhang, Sumeet Singh, Subhabrata Sen, Nick Duffield, and Carsten Lund, Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Taormina, Sicily, Italy, October 2004.

Performance Directed Energy Management for Main Memory and Disks, Xiaodong Li, Zhenmin Li, Francis David, Pin Zhou, Yuanyuan Zhou, Sarita Adve, and Sanjeev Kumar, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Boston, MA, October 2004.

Realistic Large Scale Online Network Simulation, Xin Liu and Andrew Chien, Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.

Realistic Modeling and Synthesis of Resources for Computational Grids, Yang-Suk Kee, Henri Casanova, and Andrew Chien, Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.

Resource Management for Rapid Application Turnaround on Enterprise Desktop Grids, Derrick Kondo, Andrew Chien, and Henri Casanova, Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.

ShortCuts: Using Soft State To Improve DHT Routing, Kiran Tati and Geoffrey M. Voelker, Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004.

Towards Informed Web Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004. (Best student paper).

Resource Allocation in Federated Distributed Computing Infrastructures, Alvin AuYoung, Brent N. Chun, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure, Boston, MA, October 2004.

Routing in an Internet-Scale Network Emulator, Jay Chen, Diwaker Gupta, Kashi V. Vishwanath, Alex C. Snoeren, and Amin Vahdat, Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Volendam, The Netherlands, October 2004, pages 275-283.

The Lonely NATed Node, Chad Yoshikawa, Brent Chun, and Amin Vahdat, Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, September 2004.

A System for Authenticated Policy-Compliant Routing, Barath Raghavan and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004, pages 167-178.

Building a Better NetFlow, Cristian Estan, Ken Keys, David Moore, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004.

Network Sensitivity to Hot-Potato Disruptions, Renata Teixeira, Aman Shaikh, Tim Griffin, and Geoffrey M. Voelker, Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004.

A Measurement Framework for Pinpointing Routing Changes, Renata Teixeira and Jennifer Rexford, Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, Portland, OR, September 2004.

A User-Level Framework for Scheduling within Service Execution Environments, Travis Newhouse and Joseph Pasquale, Proceedings of the IEEE International Conference on Services Computing, Shanghai, China, September 2004.

Using Behavior Templates to Design Remotely-executing Agents for Wireless Clients, Eugene Hung and Joseph Pasquale, Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.

Resource-controlled Remote Execution to Enhance Wireless Network Applications, Travis Newhouse and Joseph Pasquale, Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.

Flexible Architecture for Customizing Streams for Wireless Clients, Jesse Steinberg and Joseph Pasquale, Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.

The Spread of the Witty Worm, Colleen Shannon and David Moore, IEEE Security and Privacy 2(4), July 2004.

UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection, Zhenmin Li, Jed Taylor, Elizabeth Partridge, Yuanyuan Zhou, William Yurcik, Cristina Abad, James J. Barlow, and Jeff Rosendale, International Conference on Telecommunication Systems - Modeling and Analysis (ICTSM), July 2004.

Light-weight Multicast Services (LMS): a Router-assisted Scheme for Reliable Multicast, Christos Papadopoulos, Guru Parulkar, and George Varghese, IEEE/ACM Transactions on Networking 12(3), June 2004.

PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy, Qingbo Zhu, Asim Shankar, and Yuanyuan Zhou, Proceedings of the 18th Annual International Conference on Supercomputing(ICS), St Malo, France, June 2004, pages 79-88.

iWatcher: Efficient Architectural Support for Software Debugging, Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas, Proceedings of the 31st International Symposium on Computer Architecture (ISCA), Munnchen, Germany, June 2004, pages 224-235.

Parallelism versus Memory Allocation in Pipelined Router Forwarding Engines, Fan Chung Graham, Ron Graham, and George Varghese, Proceedings of the ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), Barcelona, Spain, June 2004.

Fault-Tolerant Forwarding in the Face of Malicious Routers, Alper Mizrak, Keith Marzullo, and Stefan Savage, Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2004.

Reduced State Fair Queuing for Edge and Core Routers, Ramana Rao Kompella and George Varghese, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Kinsale, County Cork, Ireland, June 2004.

Evaluation of Rate-based Transport Protocols for Lambda-Grids, Ryan Wu and Andrew Chien, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Honolulu, HI, June 2004.

Dynamics of Hot-Potato Routing in IP Networks, Renata Teixeira, Aman Shaikh, Tim Griffin, and Jennifer Rexford, Proceedings of the ACM SIGMETRICS Conference, New York, NY, June 2004.

Second-Level Buffer Cache Management, Yuanyuan Zhou, Zhifeng Chen, and Kai Li, IEEE Transactions on Parallel and Distributed Systems 15(6):505-519, June 2004.

Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging, Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, and Yuanyuan Zhou, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2004.

Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying, Yu-Chung Cheng, Urs Hoelzle, Neal Cardwell, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2004, pages 87-98.

Web Customization Using Behavior-Based Remote Executing Agents, Eugene Hung and Joseph Pasquale, Proceedings of the International World Wide Web Conference (WWW), New York, NY, May 2004.

Characterization of a Large Web Site Population with Implications for Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, Proceedings of the International World Wide Web Conference (WWW), New York, NY, May 2004.

A Uniform Projection Method for Motif Discovery in DNA Sequences, Benjamin Raphael, Lung-Tien Liu, and George Varghese, IEEE Transactions on Bioinformatics and Computational Biology 1(2), April 2004.

Tree bitmap: Hardware/Software IP Lookups with Incremental Updates, Will Etherton, George Varghese, and Zubin Dittia, ACM SIGCOMM Computer Communication Review 34(2):97-122, April 2004.

Measurements and Laboratory Simulations of the Upper DNS Hierarchy, Duane Wessels, Marina Fomenkov, Nevil Brownlee, and kc claffy, Proceedings of the Passive and Active Measurement Workshop, Antibes Juan-les-Pins, France, April 2004.

Their share: diversity and disparity in IP traffic, Andre Broido, Young Hyun, kc claffy, and Ruomei Gao, Proceedings of the Passive and Active Measurement Workshop, Antibes Juan-les-Pins, France, April 2004.

TotalRecall: System Support for Automated Availability Management, Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004, pages 337-350.

MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks, Adolfo Rodriguez, Charles Killian, Sooraj Bhat, Dejan Kostić, and Amin Vahdat, Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004.

Consistent and Automatic Service Regeneration, Haifeng Yu and Amin Vahdat, Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004.

C-Miner: Mining Block Correlations in Storage Systems, Zhenmin Li, Zhifeng Chen, Sudarshan M. Srinivasan, and Yuanyuan Zhou, Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, March 2004, pages 173-186.

The Spread of the Witty Worm, Colleen Shannon and David Moore, CAIDA Report, March 2004.

Dual Frame Motion Compensation with Uneven Quality Assignment, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2004.

Scalability in Adaptive Multi-Metric Overlays, Adolfo Rodriguez, Dejan Kostić, and Amin Vahdat, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Tokyo, Japan, March 2004.

Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection, Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese, Proceedings of the IEEE Infocom Conference, Hong Kong, China, March 2004.

Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management, Qingbo Zhu, Francis M. David, Christo F. Devaraj, Zhenmin Li, Yuanyuan Zhou, and Pei Cao, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Madrid, Spain, February 2004, pages 118-129.

Longitudinal study of Internet traffic from 1998-2003, Marina Fomenkov, Ken Keys, David Moore, and kc claffy, Proceedings of the Winter Interational Symposium on Information and Communication Technologies, Cancun, Mexico, January 2004.

Delta Routing: Improving the Price-Performance of Hybrid Private Networks, George Porter and Minwen Ji, Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS), Seoul, Korea, April 2004.

2003

Double Hashing with Multiple Passbits, Paul M. Martini and Walter A. Burkhard, International Journal of Foundations of Computer Science 14(6):1165-1182, December 2003.

Workload and Failure Characterization on a Large-Scale Federated Testbed, Brent Chun and Amin Vahdat, Intel Research Berkeley technical report IRB-TR-03-040, November 2003.

Dual frame motion compensation for a rate switching network, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the 37th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, November 2003.

Bandwidth estimation: metrics, measurement techniques, and tools, Constantinos Dovrolis, Ravi Prasad, Margaret Murray, and kc claffy, IEEE Network 17(6):27-35, November 2003.

Decoupling Policy from Mechanism in Internet Routing, Alex C. Snoeren and Barath Raghavan, Proceedings of the 2nd ACM Workshop on Hot Topics in Networks (HotNets-II), Cambridge, MA, November 2003, pages 81-86.

The Measurement Manifesto, George Varghese and Cristian Estan, Proceedings of the 2nd ACM Workshop on Hot Topics in Networks (HotNets-II), Cambridge, MA, November 2003.

Practical Lazy Scheduling in Sensor Networks, Ramana Rao Kompella and Alex C. Snoeren, Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, November 2003, pages 280-291.

Traffic-based Load Balance for Scalable Network Emulation, Xin Liu and Andrew A. Chien, Proceedings of Supercomputing Conference, Phoenix, AZ, November 2003.

The OptiPuter, L. Smarr, A. Chien, T. DeFanti, J. Leigh, and P. Papadopoulos, Communications of the Association for Computing Machinery 47(11), November 2003.

Transport Protocols for High Performance: Whither TCP?, T. Faber, A. Falk, J. Bannister, A. Chien, R. Grossman, and J. Leigh, Communications of the Association for Computing Machinery 47(11), November 2003.

Measuring and Characterizing End-to-End Internet Service Performance, Lucy Cherkasova, Yun Fu, Wenting Tang, and Amin Vahdat, ACM Transactions on Internet Technology (TOIT) 3(4), November 2003.

Bitmap Algorithms for Counting Active Flows on High Speed Links, Cristian Estan, George Varghese, and Mike Fisk, Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Miami, FL, October 2003.

Best-Path vs. Multi-Path Overlay Routing, David G. Andersen, Alex C. Snoeren, and Hari Balakrishnan, Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Miami, FL, October 2003, pages 91-100.

In Search of Path Diversity in ISP Networks, Renata Teixeira, Keith Marzullo, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX/ACM Internet Measurement Conference (IMC), Miami, FL, October 2003, pages 313-318.

End-to-End differentiation of congestion and wireless losses, Song Cen, Pamela C. Cosman, and Geoffrey M. Voelker, IEEE/ACM Transactions on Networking 11(5):703-717, October 2003.

Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh, Dejan Kostić, Adolfo Rodriguez, Jeannie Albrecht, and Amin Vahdat, Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October 2003.

SHARP: An Architecture for Secure Resource Peering, Yun Fu, Jeffrey S. Chase, Brent Chun, Stephen Schwab, and Amin Vahdat, Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October 2003.

Toward Scaling Network Emulation using Topology Partitioning, Ken Yocum, Ethan Eade, Julius Degesys, David Becker, Jeff Chase, and Amin Vahdat, Proceedings of the Eleventh IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Orlando, FL, October 2003.

Tolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Overlay Network Topology, Ju Wang, Linyuan Lu, and Andrew A. Chien, Proceeding of ACM Workshop on Survivable and Self-Regenerative Systems, October 2003.

Wireless Hotspots: Current Challenges and Future Directions, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), San Diego, CA, September 2003.

Automatically Inferring Patterns of Resource Consumption in Network Traffic, Cristian Estan, Stefan Savage, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003, pages 137-148.

Stratified Round Robin: A Low Complexity Packet Scheduler with Bandwidth Fairness and Bounded Delay, Sriram Ramabhadran and Joseph Pasquale, Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.

Packet Classification Using Multidimensional Cutting, Sumeet Singh, Florin Baboescu, George Varghese, and Jia Wang, Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.

The Impact of Address Allocation and Routing on the Structure and Implementation of Routing Tables, Harsha Narayan, Ramesh Govindan, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.

802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, John Bellardo and Stefan Savage, Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003, pages 15-28.

Dynamic Detection and Prevention of Race Conditions in File Accesses, Eugene Tsyrklevich and Bennet Yee, Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003.

Fast and Scalable Conflict Detection for Packet Classifiers, Florin Baboescu and George Varghese, Computer Networks 42(6):717-735, August 2003.

New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice, Cristian Estan and George Varghese, ACM Transactions on Computer Systems 21(3), August 2003.

Inside the Slammer Worm, David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver, IEEE Security and Privacy 1(4):33-39, July 2003.

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup, Alper Mizrak, Yu-Chung Cheng, Vineet Kumar, and Stefan Savage, Proceedings of the 4th IEEE Workshop on Internet Applications, San Jose, CA, June 2003, pages 104-111.

A Pipelined Memory Architecture for High Throughput Network Processors, Timothy Sherwood, George Varghese, and Brad Calder, Proceedings of the 30th International Symposium on Computer Architecture (ISCA), San Diego, CA, June 2003.

Efficient Implementation of a Statistics Counter Architecture, Sriram Ramabhadran and George Varghese, Proceedings of the ACM SIGMETRICS Conference, San Diego, CA, June 2003.

Engineering fault-tolerant TCP/IP services using FT-TCP, Dmitrii Zagorodnov, Keith Marzullo, Lorenzo Alvisi, and Thomas Bressoud, Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), San Francisco, CA, June 2003.

Priority Forwarding in Ad Hoc Networks with Self-Interested Parties, Barath Raghavan and Alex C. Snoeren, Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.

The Case for Service Provider Deployment of Super-Peers in Peer-to-Peer Networks, Sumeet Singh, Sriram Ramabhadran, Florin Baboescu, and Alex C. Snoeren, Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.

Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering, Brent N. Chun, Yun Fu, and Amin Vahdat, Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.

MediSyn: A Synthetic Streaming Media Service Workload Generator, Wenting Tang, Yun Fu, Ludmila Cherkasova, and Amin Vahdat, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Monterey, CA, June 2003.

Efficient Peer-to-Peer Keyword Searching, Patrick Reynolds and Amin Vahdat, Proceeding of the ACM/IFIP/USENIX Middleware Conference, Rio de Janeiro, Brazil, June 2003.

Currentcy: A Unifying Abstraction for Expressing Energy Management Policies, Heng Zeng, Carla S. Ellis, Alvin R. Lebeck, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, San Antonio, TX, June 2003.

Eviction-Based Cache Placement for Storage Caches, Zhifeng Chen, Yuanyuan Zhou, and Kai Li, Proceedings of the USENIX Annual Technical Conference, San Antonio, TX, June 2003.

Scalable Data Management Alternatives to Support Data Mining Heterogeneous Logs for Computer Network Security, William Yurcik, Jim Barlow, Yuanyuan Zhou, Hrishikesh Raje, Yifan Li, Xiaoxin Yin, Mike Haberman, Jeff Rosendale, Dora Cai, and Duane Searsmith, 2003 SIAM Workshop on Data Mining for Counter Terrorism and Security, June 2003.

The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe, Flavio Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS-IX), Lihue, HI, May 2003, pages 73-78.

Synchronous Consensus for Dependent Process Failures, Flavio Junqueira and Keith Marzullo, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Providence, RI, May 2003.

Group Membership and Wide-Area Master Worker Computations, Kjetil Jacobsen, Xianan Zhang, and Keith Marzullo, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Providence, RI, May 2003.

Entropia: Architecture and Performance of an Enterprise Desktop Grid System, Andrew Chien, Brad Calder, Steve Elbert, and Karan Bhatia, Journal of Parallel and Distributed Computing 63(5):597-610, May 2003.

Internet Quarantine: Requirements for Containing Self-Propagating Code, David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE Infocom Conference, San Francisco, CA, April 2003, pages 1901-1910.

Packet Classification for Core Routers: Is There an Alternative to CAMs?, Florin Baboescu, Sumeet Singh, and George Varghese, Proceedings of the IEEE Infocom Conference, San Francisco, CA, April 2003.

Anypoint: Extensible Transport Switching on the Edge, Ken Yocum, Darrell Anderson, Jeffrey S. Chase, and Amin Vahdat, Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.

TESLA: A Transparent, Extensible Session-Layer Architecture for End-to-end Network Services, Jon Salz, Alex C. Snoeren, and Hari Balakrishnan, Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003, pages 221-232.

Model-Based Resource Provisioning in a Web Service Utility, Ron Doyle, Jeffrey S. Chase, Omer Asad, and Amin Vahdat, Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.

Using Random Subsets to Build Scalable Network Services, Dejan Kostić, Adolfo Rodriguez, Jeannie Albrecht, Abhijeet Bhirud, and Amin Vahdat, Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.

Traceback of Single IP Packets using SPIE, W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, and Craig Partridge, Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), Washington, DC, April 2003, pages 266-270.

Understanding Availability, Ranjita Bhagwan, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Berkeley, CA, February 2003, pages 256-267.

Catching Accurate Profiles in Hardware, Satish Narayanasamy, Timothy Sherwood, Suleyman Sair, Brad Calder, and George Varghese, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Anaheim, CA, February 2003.

The Spread of the Sapphire/Slammer Worm, David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver, CAIDA Report, January 2003.

The Bancomat Problem: An Example of Resource Allocation in a Partitionable Asynchronous Systems, Jeremy Sussman and Keith Marzullo, Journal of Theoretical Computer Science 291(1), January 2003.

2002

Single-Packet IP Traceback, Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, and W. Timothy Strayer, IEEE/ACM Transactions on Networking 10(6):721-734, December 2002.

Beyond Folklore: Observations on Fragmented Traffic, Colleen Shannon, David Moore, and kc Claffy, IEEE/ACM Transactions on Networking 10(6), December 2002.

Scalability and Accuracy in a Large-Scale Network Emulator, Amin Vahdat, Ken Yocum, Kesvin Walsh, Priya Mahadevan, Dejan Kostić, Jeffrey Chase, and David Becker, Proceedings of the 5th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, December 2002.

Fast and Scalable Conflict Detection for Packet Classifiers, Florin Baboescu and George Varghese, Proceedings of the 10th International Conference on Network Protocols (ICNP), Paris, France, November 2002.

Measuring Packet Reordering, John Bellardo and Stefan Savage, Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002, pages 97-105.

Code-Red: a Case Study on the Spread and Victims of an Internet Worm, David Moore, Colleen Shannon, and Jeffrey Brown, Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002.

Agile and Scalable Analysis of Network Events, Mike Fisk and George Varghese, Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002.

Automated Measurement of High-Volume Traffic Clusters, Cristian Estan, Stefan Savage, and George Varghese, Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002, pages 77-78.

ECOSystem: Managing Energy as a First Class Operating System Resource, Heng Zeng, Xiaobo Fan, Carla S. Ellis, Alvin Lebeck, and Amin Vahdat, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), San Jose, CA, October 2002.

Breaking the Barriers: High Performance Security for High Performance Computing, Kay Connelly and Andrew Chien, Proceedings of the New Security Paradigms Workshop, Virginia Beach, VA, September 2002.

Back to the Future: Dependable Computing through Dynamic Provisioning of Service Utilities, Jeffrey S. Chase, Amin Vahdat, and John Wilkes, Proceedings of the 10th ACM SIGOPS European Workshop, Saint Emilion, France, September 2002.

New Directions in Traffic Measurement and Accounting, Cristian Estan and George Varghese, Proceedings of the ACM SIGCOMM Conference, Pittsburgh, PA, August 2002.

Route Flap Damping Exacerbates Internet Routing Convergence, Zhuoqing Morley Mao, Ramesh Govindan, George Varghese, and Randy Katz, Proceedings of the ACM SIGCOMM Conference, Pittsburgh, PA, August 2002.

Design and Evaluation of a Conit-based Continuous Consistency Model for Replicated Services, Haifeng Yu and Amin Vahdat, ACM Transactions on Computer Systems 20(3):239-282, August 2002.

Moshe: A group membership service for WANs, Idit Keidar, Jeremy B. Sussman, Keith Marzullo, and Danny Dolev, ACM Transactions on Computer Systems 20(3):191-238, August 2002.

Whole Page Performance, Leeann Bent and Geoffrey M. Voelker, Proceedings of the 7th International Web Caching Workshop (WCW), Boulder, CO, August 2002.

Service Level Agreement Based Distributed Resource Allocation for Streaming Hosting System, Yun Fu and Amin Vahdat, Proceedings of the 7th International Web Caching Workshop (WCW), Boulder, CO, August 2002.

High-Performance Cluster Storage Server, Keith Bell, Andrew Chien, and Mario Lauria, Proceedings of the IEEE Interational Conference on Multimedia Communications and Systems (ICMCS), Edinburgh, United Kingdom, July 2002.

Minimal Cost Replication for Availability, Haifeng Yu and Amin Vahdat, Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), Monterey, CA, July 2002.

A Framework for Application-specific Customization of Network Services, Sriram Ramabhadran and Joseph Pasquale, Proceedings of the International Workshop on Active Middleware Services, Edinburgh, United Kingdom, July 2002.

Characterizing User Behavior and Network Performance in a Public Wireless LAN, Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, and Venkat Rangan, Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.

Symbiotic Jobscheduling with Priorities for a Simultaneous Multithreading Processor, Allan Snavely, Dean Tullsen, and Geoffrey M. Voelker, Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.

Experiences with VI communication for database storage, Yuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Cezary Dubnicki, James F. Philbin, and Kai Li, Proceedings of the 29th International Symposium on Computer Architecture (ISCA), Anchorage, AK, May 2002, pages 257-268.

Hot-Spot Congestion Relief in Public-Area Wireless Networks, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Callicoon, NY, June 2002.

Replication Strategies for Highly Available Peer-to-Peer Storage, Ranjita Bhagwan, David Moore, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2002.

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality, Amin Vahdat, Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2002.

Opus: An Overlay Peer Utility Service, Rebecca Braynard, Dejan Kostić, Adolfo Rodriguez, Jeffrey S. Chase, and Amin Vahdat, Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH), New York, NY, June 2002.

Application-specific Network Management for Energy-aware Streaming of Popular Multimedia Formats, Surendar Chandra and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Monterey, CA, June 2002.

EtE: Passive End-to-End Internet Service Performance, Yun Fu, Ludmila Cherkasova, Wenting Tang, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Monterey, CA, June 2002. (Best student paper).

A Web Middleware Architecture for Dynamic Customization of Content for Wireless Clients, Jesse Steinberg and Joseph Pasquale, Proceedings of the International World Wide Web Conference (WWW), Honolulu, HI, May 2002.

Tracking Mobile Units for Dependable Message Delivery, Amy Murphy, Gruia-Catalin Roman, and George Varghese, IEEE Transactions on Software Engineering 28(5):433-448, May 2002.

Architecture of the Entropia Distributed Computing System, Andrew Chien, Proceedings of the International Parallel and Distributed Processing Symposium, Ft. Lauderdale, FL, April 2002.

Self-organizing Subsets: From Each According to His Abilities, To Each According to His Needs, Amin Vahdat, Jeffrey S. Chase, Rebecca Braynard, Dejan Kostić, Patrick Reynolds, and Adolfo Rodriguez, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Cambridge, MA, March 2002.

Causality tracking in causal message-logging protocols, Lorenzo Alvisi, Karan Bhatia, and Keith Marzullo, Distributed Computing 15(1), February 2002.

Interposed Request Routing for Scalable Network Storage, Darrell Anderson, Jeffrey S. Chase, and Amin Vahdat, ACM Transactions on Computer Systems 20(1):25-48, February 2002.

PAWNs: Satisfying the Need for Ubiquitous Secure Connectivity and Location Services, Paramvir Bahl, Wilf Russell, Yi-Min Wang, Anand Balachandran, Geoffrey M. Voelker, and Allen Miu, IEEE Wireless Communications 9(1):40-48, February 2002.

Improving Wireless Access to the Internet by Extending the Client/Server Model, Joseph Pasquale, Eugene Hung, Travis Newhouse, Jessee Steinberg, and Sriram Ramabhadran, Proceedings of the European Wireless Conference, Florance, Italy, February 2002.

End-to-end Differentiation of Congestion and Wireless Losses, Song Cen, Pamela Cosman, and Geoffrey M. Voelker, Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2002.

Coarse-Grained Network Simulation for Wide-Area Distributed Systems, Syam Gadde, Jeffrey S. Chase, and Amin Vahdat, Proceedings of Communication Networks and Distributed Systems Modeling and Simulation, Phoenix, AZ, January 2002.

The Apprentice Challenge, J Strother Moore and George Porter, ACM Transactions on Programming Languages and Systems (TOPLAS) 24(3):193-216, May 2002.

The SAHARA Model for Service Composition Across Multiple Providers, Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansoon, Kevin Lai, Tal Lavian, Sridhar Machiraju, Z Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy Shih, Keith Sklower, Lakshmi Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony Joseph, Randy H. Katz, and Ion Stoica, Proceedings of the International Conference on Pervasive Computing (Pervasive), August 2002.

Providing Quality of Service for Wireless Links in Wireless/Wired Networks, Norival Figueira and Joseph Pasquale, IEEE Personal Communications 6(5), October 2002.

2001

Robust Congestion Signaling, David Ely, Neil Spring, David Wetherall, Stefan Savage, and Tom Anderson, Proceedings of the 9th International Conference on Network Protocols (ICNP), Riverside, CA, November 2001, pages 332-341.

Fast Firewall Implementations for Software and Hardware Based Routers, Lili Qiu, George Varghese, and Subash Suri, Proceedings of the 9th International Conference on Network Protocols (ICNP), Riverside, CA, November 2001.

Multiway Range Trees: Scalable IP lookups with Fast Updates, Subhash Suri, George Varghese, and Priyank Warkhede, Proceedings of the 6th IEEE Global Internet Symposium (GlobeCom), San Antonio, TX, November 2001.

Scalable High-speed Prefix Matching, Marcel Waldvogel, George Varghese, Jon Turner, and Bernhard Plattner, ACM Transactions on Computer Systems 19(4):440-482, November 2001.

The GrADS Project: Software Support for High-Level Grid Application Development, Francine Berman, Andrew Chien, Keith Cooper, Jack Dongarra, Ian Foster, Dennis Gannon, Lennart Johnsson, Ken Kennedy, Carl Kesselman, John Mellor-Crummey, Dan Reed, Linda Torczon, and Rich Wolski, International Journal of High Performance Computing Applications 15(4):327-344, November 2001.

Mesh Based Content Routing using XML, Alex C. Snoeren, Kenneth Conley, and David K. Gifford, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001, pages 160-173.

Managing Energy and Server Resources in Hosting Centers, Jeffrey S. Chase, Darrell Anderson, Prachi Thakar, Amin Vahdat, and Ronald Doyle, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001.

The Costs and Limits of Availability for Replicated Services, Haifeng Yu and Amin Vahdat, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001.

Inferring Internet Denial of Service Activity, David Moore, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001, pages 9-22. (Best paper and Test of Time Awards).

Hash-Based IP Traceback, Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer, Proceedings of the ACM SIGCOMM Conference, San Diego, CA, August 2001, pages 3-14. (Best student paper).

Scalable Packet Classification, Florin Baboescu and George Varghese, Proceedings of the ACM SIGCOMM Conference, San Diego, CA, August 2001.

Scalable Causal Message Logging for Wide-Area Environments, Karan Bhatia, Keith Marzullo, and Lorenzo Alvisi, European conference on Parallel Computing (Euro-Par), Manchester, United Kingdom, August 2001.

Segmented Information Dispersal (SID) Data Layouts for Digital Video Servers, Ariel Cohen and Walter A. Burkhard, IEEE Transactions on Knowledge and Data Engineering 13(4):593-606, July 2001.

Exploring the Benefits of a Continuous Consistency Model for Wireless Web Portals, Jagadeeswaran Rajendiran, Jaidev Patwardhan, Vijay Abhijit, Rahul Lakhotia, and Amin Vahdat, Proceedings of the 2nd IEEE Workshop on Internet Applications, San Jose, CA, July 2001.

Scalable and Self-Organizing (Meta) Data Dissemination for Ubiquitous Computing, Amin Vahdat, Proceedings of the 2nd IEEE Workshop on Internet Applications, San Jose, CA, July 2001.

Network Support for IP Traceback, Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, IEEE/ACM Transactions on Networking 9(3):226-237, June 2001.

Hardware Support for a Hash-Based IP Traceback, Luis A. Sanchez, Walter C. Milliken, Alex C. Snoeren, Fabrice Tchakountio, Christine E. Jones, Stephen T. Kent, Craig Partridge, and W. Timothy Strayer, Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), Anaheim, CA, June 2001.

The Multi-Queue Replacement Algorithm for Second Level Buffer Caches, Yuanyuan Zhou, James Philbin, and Kai Li, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2001.

The Trickle-Down Effect: Web Caching and Server Request Distribution, Ronald P. Doyle, Jeffrey S. Chase, Syam Gadde, and Amin Vahdat, Proceedings of the 6th International Web Caching Workshop (WCW), Boston, MA, June 2001.

The Medusa Proxy: A Tool for Exploring User-Perceived Web Performance, Mimika Koletsou and Geoffrey M. Voelker, Proceedings of the 6th International Web Caching Workshop (WCW), Boston, MA, June 2001.

Reconsidering Internet Mobility, Alex C. Snoeren, Hari Balakishnan, and M. Frans Kaashoek, Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elmau, Germany, May 2001, pages 41-46.

Position Summary: Anypoint Communication Protocol, Ken Yocum, Darrell Anderson, Jeffrey S. Chase, and Amin Vahdat, Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elmau, Germany, May 2001.

On the Placement of Web Server Replicas, Lili Qiu, Venkata N. Padmanabhan, and Geoffrey M. Voelker, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Wrapping Server-Side TCP to Mask Connection Failures, Lorenzo Alvisi, Thomas Bressoud, Ayman El-Khashab, Keith Marzullo, and Dmitrii Zagorodnov, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Fast Packet Classification for Two-Dimensional Conflict-Free Filters, Priyank Warkhede, Subhash Suriand, and George Varghese, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Reducing Web Latency Using Reference Point Caching, Girish P. Chandranmenon and George Varghese, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

A Lower Bound for Multicast Key Distribution, Jack Snoeyink, Subhash Suri, and George Varghese, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Alpine: A User-Level Infrastructure for Network Protocol Development, David Ely, Stefan Savage, and David Wetherall, Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001, pages 171-183.

Measurement and Analysis of a Streaming Media Workload, Maureen Chesire, Alec Wolman, Geoffrey M. Voelker, and Henry M. Levy, Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001. (Best paper).

Fine-Grained Failover Using Connection Migration, Alex C. Snoeren, David G. Andersen, and Hari Balakrishnan, Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001, pages 221-232.

FIRE: Flexible Intra-AS Routing Environment, Craig Partridge, Alex C. Snoeren, W. Timothy Strayer, Beverly Schwartz, Matthew Condell, and Isidro Castiñeyra, IEEE Journal on Selected Areas in Communication 19(3):410-425, March 2001.

TOS: Kernel Support for Distributed Systems Management, Kåre J. Lauvset, Dag Johansen, and Keith Marzullo, Proceedings of the ACM Symposium on Applied Computing (SAC), Las Vegas, NV, March 2001.

A Chat Room Assignment for Teaching Network Security, William Mitchener and Amin Vahdat, Proceedings of the 32nd Technical Symposium on Computer Science Education, Charlotte, NC, February 2001.

Transcoding Characteristics of Web Images, Surendar Chandra, Ashish Gehani, Carla S. Ellis, and Amin Vahdat, Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2001.

Formal Models of Java at the JVM Level--a Survey from the ACL2 Perspective, J Strother Moore, Robert Krug, Hanbing Liu, and George Porter, Proceedings of Workshop on Formal Techniques for Java Programs / ECOOP, Budapest, Hungary, June 2001.

An Executable Formal Java Virtual Machine Thread Model, J Strother Moore and George Porter, Proceedings of the USENIX Java Virtual Machine Symposium (JVM), Monterey, CA, April 2001.

Combining Generality and Practicality in a Conit-Based Continuous Consistency Model for Wide-Area Replication, Haifeng Yu and Amin Vahdat, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Phoenix, AZ, April 2001.

2000

Application-Level Differentiated Multimedia Web Services Using Quality Aware Transcoding, Surendar Chandra, Carla S. Ellis, and Amin Vahdat, IEEE Journal on Selected Areas in Communication 18(12):2544-2564, December 2000.

Optimistic Virtual Synchrony, Jeremy B. Sussman, Idit Keidar, and Keith Marzullo, Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS), Nurnberg, Germany, October 2000.

Gossip versus Deterministically Constrained Flooding on Small Networks, Meng-Jang Lin, Keith Marzullo, and Stefano Masini, Proceedings of the International Symposium on Distributed Computing (DISC), Toledo, Spain, October 2000.

Design and Evaluation of a Continuous Consistency Model for Replicated Services, Haifeng Yu and Amin Vahdat, Proceedings of the 4th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, October 2000.

Interposed Request Routing for Scalable Network Storage, Darrell Anderson, Jeffrey S. Chase, and Amin Vahdat, Proceedings of the 4th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, October 2000. (Award paper).

Every Joule is Precious: The Case for Revisiting Operating System Design for Energy Efficiency, Amin Vahdat, Alvin Lebeck, and Carla S. Ellis, Proceedings of the 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 2000.

Efficient Numerical Bounding for Replicated Network Services, Haifeng Yu and Amin Vahdat, Proceedings of the 26th International Conference on Very Large Databases (VLDB), Cairo, Egypt, September 2000.

Practical Network Support for IP Traceback, Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000, pages 295-306.

Memory Efficient State Lookups with Fast Updates, Sandeep Sikka and George Varghese, Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000.

FIRE: Flexible Intra-AS Routing Environment, Craig Partridge, Alex C. Snoeren, W. Timothy Strayer, Beverly Schwartz, Matthew Condell, and Isidro Castiñeyra, Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000, pages 191-203.

An End-to-End Approach to Host Mobility, Alex C. Snoeren and Hari Balakrishnan, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Boston, MA, August 2000, pages 155-166.

Managing the Storage and Battery Resources in an Image Capture Device (Digital Camera) using Dynamic Transcoding, Surendar Chandra, Carla S. Ellis, and Amin Vahdat, Proceedings of the 3rd ACM/IEEE International Workshop on Wireless and Mobile Multimedia (WoWMoM), Boston, MA, August 2000.

Epidemic Routing for Partially Connected Ad Hoc Networks, Amin Vahdat and David Becker, Duke University technical report , July 2000.

A Predictive Block Sampling Algorithm for Desktop Multimedia Video Applications, Joseph Pasquale, T. Nguyen, and J. Kay, Proceedings of IEEE International Conference on Multimedia and Expo, New York, NY, July 2000.

An Automatic Object Inlining Optimization and its Evaluation, Julian Dolby and Andrew Chien, Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI), Vancouver, Canada, June 2000.

Building Replicated Internet Services Using TACT: Tunable Availability/Consistency Tradeoffs, Haifeng Yu and Amin Vahdat, Proceedings of the 2nd International Workshop on Advanced issues of E-Commerce and Web-Based Information Systems (WECWIS), Milpitas, CA, June 2000.

A Client-Server Oriented Algorithm for Virtually Synchronous Group Membership in WANs, Idit Keidar, Jeremy B. Sussman, Keith Marzullo, and Danny Dolev, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Taipei, Taiwan, April 2000.

Self-Stabilization by Counter Flushing, George Varghese, SIAM Journal of Computing 30(2):486-510, April 2000.

The Fault Span of Crash Failures, George Varghese and Mahesh Jayaram, Journal of the ACM 47(2):244-293, March 2000.

Modeling TCP Latency, Neal Cardwell, Stefan Savage, and Tom Anderson, Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000, pages 1742-1751.

Fast and Scalable Priority Queue Architecture for High-Speed Network Switches, Ranjita Bhagwan and Bill Lin, Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000.

Understanding the Performance of TCP Pacing, Amit Aggarwal, Stefan Savage, and Tom Anderson, Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000, pages 1157-1165.

Differentiated Multimedia Web Services Using Quality Aware Transcoding, Surendar Chandra, Carla S. Ellis, and Amin Vahdat, Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000.

1999

On the Scale and Performance of Cooperative Web Proxy Caching, Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin, and Henry M. Levy, Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island, SC, December 1999.

Adaptive Inverse Multiplexing for Wide-Area Wireless Networks, Alex C. Snoeren, Proceedings of the 4th IEEE Global Internet Symposium (GlobeCom), Rio de Janiero, Brazil, December 1999, pages 1665-1672.

An Architecture for Packet-Striping Protocols, Hari Adiseshu, George Varghese, and Guru Parulkar, ACM Transactions on Computer Systems 17(4), November 1999.

TCP Congestion Control with a Misbehaving Receiver, Stefan Savage, Neal Cardwell, David Wetherall, and Tom Anderson, ACM SIGCOMM Computer Communication Review 29(5):71-78, October 1999.

Toward Automatic State Management for Dynamic Web Services, Geoff C. Berry, Jeffrey S. Chase, Geoff A. Cohen, Landon P. Cox, and Amin Vahdat, Proceedings of the 1999 Network Storage Symposium (Netstore), Seattle, WA, October 1999.

Sting: a TCP-based Network Measurement Tool, Stefan Savage, Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999, pages 71-79. (Best student paper).

Active Names: Flexible Location and Transport of Wide-Area Resources, Amin Vahdat, Michael Dahlin, Thomas Anderson, and Amit Aggarwal, Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.

Organization-Based Analysis of Web-Object Sharing and Caching, Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Molly Brown, Tashana Landray, Denise Pinnel, Anna Karlin, and Henry Levy, Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.

The End-to-end Effects of Internet Path Selection, Stefan Savage, Andy Collins, Eric Hoffman, John Snell, and Tom Anderson, Proceedings of the ACM SIGCOMM Conference, Cambridge, MA, September 1999, pages 289-299.

Packet Classification Using Tuple Space Search, Venkatachary Srinivasan, Subhash Suri, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Cambridge, MA, September 1999.

Multimedia Web Services for Mobile Clients Using Quality Aware Transcoding, Surendar Chandra, Carla S. Ellis, and Amin Vahdat, Proceedings of the 2nd ACM/IEEE International Workshop on Wireless and Mobile Multimedia (WoWMoM), Seattle, WA, August 1999.

IP Lookups Using Multiway and Multicolumn Search, Butler Lampson, Venkatachary Srinivasan, and George Varghese, IEEE/ACM Transactions on Networking 7(3), June 1999.

VirtualQueue: A Technique for Packet Voice Stream Reconstruction, Norival R. Figueira and Joseph Pasquale, Proceedings of the IEEE Interational Conference on Multimedia Communications and Systems (ICMCS), Florence, Italy, June 1999.

NAP: Practical Fault-Tolerance for Itinerant Computations, Dag Johansen, Keith Marzullo, Fred B. Schneider, Kjetil Jacobsen, and Dmitrii Zagorodnov, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Austin, TX, June 1999.

Fast cluster failover using virtual memory-mapped communication, Yuanyuan Zhou, Peter M. Chen, and Kai Li, Proceedings of the 13th International Conference on Supercomputing (ICS), June 1999, pages 373-382.

Toward Wide-Area Resource Allocation, Amin Vahdat, Proceedings of Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, June 1999.

Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages, Gretta Bartels, Anna Karlin, Henry M. Levy, Geoffrey M. Voelker, Darrell Anderson, and Jeffrey S. Chase, Proceedings of the ACM SIGMETRICS Conference, Atlanta, GA, May 1999, pages 206-207.

The Case for Informed Transport Protocols, Stefan Savage, Neal Cardwell, and Tom Anderson, Proceedings of the 7th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VII), Rio Rico, AZ, March 1999, pages 58-63.

Fast Address Lookups Using Controlled Prefix Expansion, Venkatachary Srinivasan and George Varghese, ACM Transactions on Computer Systems 17(1), February 1999.

Detour: a Case for Informed Internet Routing and Transport, Stefan Savage, Tom Anderson, Amit Aggarwal, David Becker, Neal Cardwell, Andy Collins, Eric Hoffman, John Snell, Amin Vahdat, Geoffrey M. Voelker, and John Zahorjan, IEEE Micro 19(1):50-59, January 1999.

Packet Filtering in High Speed Networks, Subhash Suri and George Varghese, Proceedings of the ACM/SIAM Symposium on Discrete Algorithms (SODA), Baltimore, MD, January 1999.

Permutation Development Data Layout (PDDL), Thomas Schwarz, Jesse Steinberg, and Walter A. Burkhard, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Orlando, FL, January 1999.