Publications
Found 541 results
Author Title Type [ Year![(Asc)](https://icsi.berkeley.edu/icsi/sites/all/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is W [Clear All Filters]
A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2016). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2016). NetBricks: Taking the V out of NFV.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16).
(2016). Reviewer Integration and Performance Measurement for Malware Detection.
13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
(2016). SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems.
SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems.
(2016). TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Unveiling Parallelization Opportunities in Sequential Programs.
Journal of Systems and Software. 117, 282–295.
(2016). An Analysis of China’s “Great Cannon”.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
(2015). Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium.
(2015). Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium.
(2015). Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR. abs/1510.07338,
(2015). Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR. abs/1510.07338,
(2015).
(2015). Blocking-resistant communication through domain fronting.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
(2015).
(2015). China’s Great Cannon.
The Citizen Report.
(2015).
(2015).
(2015). Ethical Concerns for Censorship Measurement.
Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
(2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of ACM Internet Measurement Conference.
(2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of ACM Internet Measurement Conference.
(2015).
(2015). A Methodology for Information Flow Experiments.
2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
(2015).
(2015). Resilience of Deployed TCP to Blind Off-Path Attacks.
Proceedings of ACM Internet Measurement Conference.
(2015).