Publications

Found 215 results
Author Title [ Type(Asc)] Year
Filters: Author is Vern Paxson  [Clear All Filters]
Conference Paper
Richter, P., Wohlfart F., Vallina-Rodriguez N., Allman M., Bush R., Feldmann A., et al. (2016).  A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Proceedings of ACM Internet Measurement Conference.
Cabellero, J.., Grier C., Kreibich C., & Paxson V. (2011).  Measuring Pay-per-Install: The Commoditization of Malware Distribution.
Javed, M., Herley C., Peinado M., & Paxson V. (2015).  Measurement and Analysis of Traffic Exchange Services. Proceedings of ICM Internet Measurement Conference.
Durumeric, Z., Li F., Kasten J., Amann J., Beekman J., Payer M., et al. (2014).  The Matter of Heartbleed.
Grier, C., Ballard L., Caballero J., Chachra N., Dietrich C. J., Levchenko K., et al. (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 821-832.
Khattak, S., Javed M., Khayam S. Ali, Uzmi Z. Afzal, & Paxson V. (2014).  A Look at the Consequences of Internet Censorship Through an ISP Lens.
Callahan, T., Allman M., & Paxson V. (2010).  A Longitudinal View of HTTP Traffic.
Allman, M., & Paxson V. (2007).  Issues and Etiquette Concerning Use of Shared Measurement Data. 135-140.
Cho, C.. Y., Caballero J., Grier C., Paxson V., & Song D. (2010).  Insights from the Inside: A View of Botnet Management from Infiltration.
Franklin, J.., Paxson V., Perrig A., & Savage S. (2007).  An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. 375-388.
Duffield, N., Presti F. Lo, Paxson V., & Towsley D. (2001).  Inferring Link Loss Using Striped Unicast Probes. Proceedings of IEEE INFOCOM.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Sommer, R., Vallentin M., De Carli L., & Paxson V. (2014).  HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Pang, R., & Paxson V. (2003).  A High-level Programming Environment for Packet Trace Anonymization and Transformation. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003).
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., & Paxson V. (2015).  Header Enrichment or ISP Enrichment: Emerging Privacy Threats in Mobile Networks.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Paxson, V., & Saltmarsh C.. (1993).  Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. Proceedings of the 1993 Winter USENIX Technical Conference.
Paxson, V. (1993).  Glish: A Software Bus for High-Level Control. Proceedings of the 1993 International Conference on Accelerator and Large Experimental Physics Control Systems.
Chen, J., Jiang J., Zheng X., Duan H., Liang J., Li K., et al. (2016).  Forwarding-Loop Attacks in Content Delivery Networks. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Pang, R., Allman M., Bennett M., Lee J., Paxson V., & Tierney B. (2005).  A First Look at Modern Enterprise Traffic. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 15-28.

Pages