Publications

Found 4258 results
Author Title Type [ Year(Desc)]
2017
Bernd, J., & Corley J. (2017).  Teach Global Impact: A Resource for CSP (or Any CS Class!). Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education. 699.
Cox, R., Bird S., & Meyer B. (2017).  Teaching Computer Science in the Victorian Certificate of Education: A Pilot Study. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education.
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Lee, L., Fifield D., Malkin N., Iyer G., Egelman S., & Wagner D. (2017).  A Usability Evaluation of Tor Launcher. Proceedings on Privacy Enhancing Technologies 2017.
Panda, A., Sagiv M., & Shenker S. J. (2017).  Verification in the Age of Microservices. Proceedings of the 16th Workshop on Hot Topics in Operating Systems HotOS'17.
Panda, A., Lahav O., Argyraki K., Sagiv M., & Shenker S. J. (2017).  Verifying Reachability in Networks with Mutable Datapaths. Proceedings of NSDI '17.
Amann, J., & Sommer R. (2017).   Viable Protection of High-Performance Networks through Hardware/Software Co-Design. Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.
2018
ICSI (2018).  2018 Audited Financial Statement.
Alpernas, K., Manevich R., Panda A., Sagiv M., Shenker S. J., Shoham S., et al. (2018).  Abstract Interpretation of Stateful Networks. Proceedings of SAS 2018.
Gittens, A.., Rothauge K.., Wang S.., Mahoney M., Gerhardt L.., Prabhat, et al. (2018).  Accelerating Large-Scale Data Analysis by Offloading to High-Performance Computing Libraries using Alchemist. Proceedings of the 24th Annual SIGKDD. 293-301.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Gittens, A.., Rothauge K.., Mahoney M., Wang S.., Gerhardt L.., Prabhat, et al. (2018).  Alchemist: An Apache Spark <=> MPI Interface. Concurrency and Computation: Practice and Experience (Special Issue of the Cray User Group, CUG 2018), e5026.
Razaghpanah, A., Nithyanand R., Vallina-Rodriguez N., Sundaresan S., Allman M., Kreibich C., et al. (2018).  Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. Proceedings of NDSS 2018.
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S. J., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
Ren, J., Lindorfer M., Dubois D. J., Rao A., Choffnes D., & Vallina-Rodriguez N. (2018).  Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. NDSS 2018.
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. J. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Kotzias, P., Razaghpanah A., Amann J., Paterson K. G., Vallina-Rodriguez N., & Caballero J. (2018).  Coming of Age: A Longitudinal Study of TLS Deployment. Proceedings of IMC 18.
Allman, M. (2018).  Comments on DNS Robustness. ACM Internet Measurement Conference.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
Bird, S. (2018).  Designing Mobile Applications for Endangered Languages. The Oxford Handbook of Endangered Languages.
Yeom, S., & Tschantz M. Carl (2018).  Discriminative but Not Discriminatory: A Comparison of Fairness Definitions under Different Worldviews. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.

Pages