pdf www |
You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin ACM CCS 2019 (Conference on Computer and Communications Security) |
pdf www |
When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names Richard Roberts, Dave Levin WPES 2019 (Workshop on Privacy in the Electronic Society) Short paper |
pdf www |
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John P. Rula, Nick Sullivan ACM IMC 2019 (Internet Measurement Conference) Long paper |
Measuring TLS key exchange with post-quantum KEM Krzysztof Kwiatkowski, Nick Sullivan, Adam Langley, Dave Levin, Alan Mislove NIST Second PQC Standardization Conference, 2019 |
|
pdf www |
Is the Web Ready for OCSP Must Staple? Taejoong Chung, Jay Lok, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce Maggs, Alan Mislove, John Rula, Nick Sullivan, Christo Wilson ACM IMC 2018 (Internet Measurement Conference) Long paper |
cacm www |
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed Liang Zhang, David Choffnes, Tudor Dumitraş, Dave Levin, Alan Mislove, Aaron Schulman, Christo Wilson Communications of the ACM Research Highlights, March 2018, Vol. 61, No. 3 |
pdf www |
An End-to-End View of DNSSEC Ecosystem Management Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson USENIX ;login: Winter 2017, Vol. 42, No. 4 |
pdf www |
Understanding the Role of Registrars in DNSSEC Deployment Taejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Alan Mislove, Christo Wilson, Dave Levin, Bruce M. Maggs ACM IMC 2017 (Internet Measurement Conference) Long paper Applied Networking Research Prize 2019 |
pdf www |
A Longitudinal, End-to-End View of the DNSSEC Ecosystem Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson USENIX Security 2017 Distinguished paper award |
pdf www |
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers James Larisch, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson Oakland 2017 (IEEE Symposium on Security and Privacy) IEEE Cybersecurity Award for Innovation |
pdf www |
Measuring and Applying Invalid SSL Certificates: The Silent Majority Taejoong Chung, Yabing Liu, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson ACM IMC 2016 (Internet Measurement Conference) Long paper |
pdf www |
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem Frank Cangialosi, Taejoong Chung, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson ACM CCS 2016 (Conference on Computer and Communications Security) |
pdf www |
An End-to-End Measurement of Certificate Revocation in the Web's PKI Yabing Liu, Will Tome, Liang Zhang, David Choffnes, Dave Levin, Bruce Maggs, Alan Mislove, Aaron Schulman, Christo Wilson ACM IMC 2015 (Internet Measurement Conference) Long paper |
pdf www |
RevCast: Fast, Private Certificate Revocation over FM Radio Aaron Schulman, Dave Levin, Neil Spring ACM CCS 2014 (Conference on Computer and Communications Security) |
pdf www |
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed Liang Zhang, Dave Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, Christo Wilson ACM IMC 2014 (Internet Measurement Conference) Long paper |
pdf www |
Geneva: Evolving Censorship Evasion Strategies Kevin Bock, George Hughey, Xiao Qiang, Dave Levin ACM CCS 2019 (Conference on Computer and Communications Security) |
www |
Automatically Learning How to Evade Censorship Dave Levin USENIX ScAINet 2019 (Security and AI Networking Conference) |
pdf www |
DeTor: Provably Avoiding Geographic Regions in Tor Zhihao Li, Stephen Herwig, Dave Levin USENIX Security 2017 |
pdf www |
Ting: Measuring and Exploiting Latencies Between All Tor Nodes Frank Cangialosi, Dave Levin, Neil Spring ACM IMC 2015 (Internet Measurement Conference) Long paper |
pdf slides www |
Alibi Routing Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee ACM SIGCOMM 2015 |
pdf www |
Residential Links Under the Weather Ramakrishna Padmanabhan, Aaron Schulman, Dave Levin, Neil Spring ACM SIGCOMM 2019 |
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin NDSS 2019 (Network and Distributed System Security Symposium) |
|
pdf www |
How to find correlated Internet failures Ramakrishna Padmanabhan, Aaron Schulman, Alberto Dainotti, Dave Levin, Neil Spring PAM 2019 (Passive and Active Measurement Conference) |
pdf www |
Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee ACM SIGCOMM 2018 |
pdf www |
Anomaly Detection on D-root Zhihao Li, Dave Levin, Bobby Bhattacharjee, Neil Spring DINR Workshop 2016 (DNS and Internet Naming Research Directions) |
pdf www |
DNSql: Processing Massive DNS Collections Stephen Herwig, Dave Levin, Bobby Bhattacharjee, Neil Spring DINR Workshop 2016 (DNS and Internet Naming Research Directions) |
UAv6: Alias Resolution in IPv6 Using Unused Addresses Ramakrishna Padmanabhan, Zhihao Li, Dave Levin, Neil Spring PAM 2015 (Passive and Active Measurement Conference) |
|
pdf www |
D-mystifying the D-root Address Change Matthew Lentz, Dave Levin, Jason Castonguay, Neil Spring, Bobby Bhattacharjee ACM IMC 2013 (Internet Measurement Conference) Short paper |
To appear |
Achieving Keyless CDNs with Conclaves Stephen Herwig, Christina Garman, Dave Levin USENIX Security 2020 |
Analyzing Ethereum's Contract Topology Lucianna Kiffer, Dave Levin, Alan Mislove ACM IMC 2018 (Internet Measurement Conference) Short paper |
|
Stick a fork in it: Analyzing the Ethereum network partition Lucianna Kiffer, Dave Levin, Alan Mislove ACM HotNets 2017 (Workshop on Hot Topics in Networks) |
|
pdf www |
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge Kevin Bock, Daven Patel, George Hughey, Dave Levin WOOT 2017 (USENIX Workshop on Offensive Technologies) |
Secure Sharing in Distributed Information Management Applications: Problems and Directions Piotr Mardziel, Adam Bender, Michael Hicks, Dave Levin, Mudhakar Srivatsa, Jonathan Katz ACITA 2010 (Annual Conference of the International Technology Alliance) |
|
pdf slides |
TrInc: Small Trusted Hardware for Large Distributed Systems Dave Levin, John R. Douceur, Jacob R. Lorch, Thomas Moscibroda NSDI 2009 (USENIX Symposium on Networked Systems Design and Implementation) Best paper award |
Accountability as a Service Adam Bender, Neil Spring, Dave Levin, Bobby Bhattacharjee SRUTI 2007 (Workshop on Steps to Reducing Unwanted Traffic on the Internet) |
pdf www |
King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing Kevin Bock, George Hughey, Dave Levin USENIX ASE 2018 (Workshop on Advances in Security Education) |
pdf www |
Build It, Break It, Fix It: Contesting Secure Development Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle Mazurek, Piotr Mardziel ACM CCS 2016 (Conference on Computer and Communications Security) |
pdf www |
Build It Break It: Measuring and Comparing Development Security Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Atif Memon, Jan Plane, Piotr Mardziel CSET 2015 (Workshop on Cyber Security Experimentation and Test) |
Picocenter: Supporting long-lived, mostly-idle applications in cloud environments Liang Zhang, James Litton, Frank Cangialosi, Theophilus Benson, Dave Levin, Alan Mislove EuroSys 2016 (European Conference on Computer Systems) |
|
Picocenter: Supporting Long-Lived, Mostly Idle Applications in Cloud Environments Liang Zhang, Frank Cangialosi, Theophilus Benson, Dave Levin, Alan Mislove ACM Symposium on Cloud Computing (SoCC) 2015 (poster) |
Programming Slick Network Functions Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin SOSR 2015 (Symposium on SDN Research) |
|
A Slick Control Plane for Network Middleboxes Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin, Jennifer Rexford HotSDN 2013 (Hot Topics in Software Defined Networking; poster) and ONS 2013 (Open Network Summit) |
|
SDX: A Software Defined Internet Exchange Nick Feamster, Jennifer Rexford, Scott Shenker, Dave Levin, Russ Clark, Josh Bailey ONS 2013 (Open Network Summit) |
Don't Love Thy Nearest Neighbor Cristian Lumezanu, Dave Levin, Bo Han, Neil Spring, Bobby Bhattacharjee IPTPS 2010 (International Workshop on Peer-to-Peer Systems) |
|
pdf
www |
Symbiotic Relationships in Internet Routing Overlays Cristian Lumezanu, Randolph Baden, Dave Levin, Neil Spring, Bobby Bhattacharjee NSDI 2009 (USENIX Symposium on Networked Systems Design and Implementation) |
pdf www |
PeerWise Discovery and Negotiation of Faster Paths Cristian Lumezanu, Dave Levin, Neil Spring HotNets 2007 (Workshop on Hot Topics in Networking) |
Making Currency Cheap with iOwe Dave Levin, Aaron Schulman, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee NetEcon 2011 (Workshop on The Economics of Networks, Systems, and Computation) |
|
Stay or go? Participation in Under-Provisioned Video Streams Dave Levin, Daniel Malter, Neil Spring, Bobby Bhattacharjee NetEcon 2009 (Workshop on The Economics of Networks, Systems, and Computation) |
|
Systems-Compatible Incentives Dave Levin, Neil Spring, Bobby Bhattacharjee GameNets 2009 (International Conference on Game Theory for Networks), Invited paper |
|
pdf slides www |
BitTorrent is an Auction: Analyzing and Improving BitTorrent's Incentives Dave Levin, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee ACM SIGCOMM 2008 |
pdf slides www |
Motivating Participation in Internet Routing Overlays Dave Levin, Randolph Baden, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee NetEcon 2008 (Workshop on the Economics of Networks, Systems, and Computation) |
Backbone Construction in Selfish Wireless Networks Seungjoon Lee, Dave Levin, Vijay Gopalakrishnan, Bobby Bhattacharjee SIGMETRICS 2007 (ACM International Conference on Measurement and Modeling of Computer Systems) |
|
pdf slides |
Boycotting and Extorting Nodes in an Internetwork Dave Levin, Adam Bender, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee NetEcon+IBC 2007 (Workshop on the Economics of Networked Systems and Incentive-Based Computing) |
pdf slides |
Punishment in Selfish Wireless Networks: A Game Theoretic Analysis Dave Levin NetEcon 2006 (Workshop on the Economics of Networked Systems) |
pdf www |
Fair File Swarming with FOX Dave Levin, Rob Sherwood, Bobby Bhattacharjee IPTPS 2006 (International Workshop on Peer-to-Peer Systems) |
pdf www |
On the Fidelity of 802.11 Packet Traces Aaron Schulman, Dave Levin, Neil Spring PAM 2008 (Passive and Active Measurement Conference) |
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks Deepti Chafekar, V. S. Anil Kumar, Dave Levin, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan INFOCOM 2008 (IEEE Conference on Computer Communications) |