Publications

Found 217 results
Author [ Title(Asc)] Type Year
Filters: Author is Vern Paxson  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Paxson, V. (2009).  How the Pursuit of Truth Led Me to Selling Viagra.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Sommer, R., Vallentin M., De Carli L., & Paxson V. (2014).  HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Pang, R., & Paxson V. (2003).  A High-level Programming Environment for Packet Trace Anonymization and Transformation. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003).
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., & Paxson V. (2015).  Header Enrichment or ISP Enrichment: Emerging Privacy Threats in Mobile Networks.

Pages