Publications

Found 72 results
Author Title [ Type(Asc)] Year
Filters: Author is Nicholas Weaver  [Clear All Filters]
Conference Paper
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Vallina-Rodriguez, N., Amann J., Kreibich C., Weaver N., & Paxson V. (2014).  A Tangled Mass: The Android Root Certificate Stores.
Weaver, N., & Sommer R. (2007).  Stress Testing Cluster Bro. Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Gonzalez, J. Maria, Paxson V., & Weaver N. (2007).  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Friedland, G., Maier G., Sommer R., & Weaver N. (2011).  Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy.
Weaver, N., Hauser J., & Wawrzynek J. (2004).  The SFRA: A Corner-Turn FPGA Architecture. Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004). 3-12.
Koskela, J.., Weaver N., Gurtov A., & Allman M. (2009).  Securing Web Content. 7-12.
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
Weaver, N., Kreibich C., & Paxson V. (2011).  Redirecting DNS for Ads and Profit.
Cui, W., Paxson V., Weaver N., & Katz R. H. (2006).  Protocol-Independent Adaptive Replay of Application Dialog. Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication Over DNS. SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication over DNS.
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.
Chu, M., Weaver N., Sulimma K., DeHon A., & Wawrzynek J. (1998).  Object Oriented Circuit Generators in Java. Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM).
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating The Edge Network. 246-259.
Richter, P., Wohlfart F., Vallina-Rodriguez N., Allman M., Bush R., Feldmann A., et al. (2016).  A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Proceedings of ACM Internet Measurement Conference.
Durumeric, Z., Li F., Kasten J., Amann J., Beekman J., Payer M., et al. (2014).  The Matter of Heartbleed.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).

Pages