Publications

Found 50 results
Author Title [ Type(Asc)] Year
Filters: Author is Robin Sommer  [Clear All Filters]
Technical Report
Hadziosmanovic, D., Sommer R., Zambon E., & Hartel P. (2013).  Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems.
Sommer, R., Amann J., & Hall S. (2015).  Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data. ICSI Technical Report.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Revisiting SSL: A Large Scale Study of the Internet's Most Trusted Protocol.
Goga, O., Perito D., Lei H., Teixeira R., & Sommer R. (2013).  Large-scale Correlation of Accounts Across Social Networks.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Friedland, G., & Sommer R. (2010).  Cybercasing the Joint: On the Privacy Implications of Geo-Tagging.
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
Janin, A., Friedland G., & Sommer R. (2012).  Content?based Privacy for Consumer?Produced Multimedia.
Journal Article
Sommer, R., Weaver N., & Paxson V. (2009).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
Conference Paper
Amann, J., & Sommer R. (2017).   Viable Protection of High-Performance Networks through Hardware/Software Co-Design. Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.
Vallentin, M., Paxson V., & Sommer R. (2016).  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Weaver, N., & Sommer R. (2007).  Stress Testing Cluster Bro. Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Sommer, R., Amann J., & Hall S. (2016).  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Friedland, G., Maier G., Sommer R., & Weaver N. (2011).  Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy.
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.

Pages