pdf www |
Global, Passive Detection of Connection Tampering Ram Sundara Raman, Louis-Henri Merino, Kevin Bock, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta ACM SIGCOMM 2023 |
pdf www |
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow USENIX Security 2023 Applied Networking Research Prize 2024 CSAW Applied Research Award 2023 FOCI'23 Best Practical Award |
pdf www |
Detecting Network Interference Without Endpoint Participation Sadia Nourin, Kevin Bock, Nguyen Phong Hoang, Dave Levin FOCI 2023 (Workshop on Free and Open Communication on the Internet) |
pdf www |
Towards a Comprehensive Understanding of Russian Transit Censorship Aaron Ortwein, Kevin Bock, Dave Levin FOCI 2023 (Workshop on Free and Open Communication on the Internet) |
pdf www |
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies Nhi Tran, Kevin Bock, Dave Levin FOCI 2023 (Workshop on Free and Open Communication on the Internet) |
pdf www |
Measuring and Evading Turkmenistan's Internet Censorship Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin WWW 2023 (The Web Conference) |
pdf www |
Provably Avoiding Geographic Regions for Tor's Onion Services Arushi Arora, Raj Karra, Dave Levin, Christina Garman FC 2023 (Financial Cryptography and Data Security) |
pdf www |
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin USENIX Security 2022 |
pdf www |
Even Censors Have a Backup: Examining the GFW’s Double HTTPS Censorship System Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin FOCI 2021 (ACM Workshop on Free and Open Communications on the Internet) |
pdf www |
Bento: Safely Bringing Network Function Virtualization to Tor Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Jayson Hurst, Christina Garman, Dave Levin ACM SIGCOMM 2021 |
pdf www |
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin WOOT 2021 (IEEE Workshop on Offensive Technologies) |
pdf www |
Weaponizing Middleboxes for TCP Reflected Amplification Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin USENIX Security 2021 Distinguished paper award Internet Defense Prize |
pdf www |
Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin FOCI 2020 (USENIX Workshop on Free and Open Communications on the Internet) |
pdf www |
Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin ACM SIGCOMM 2020 Applied Networking Research Prize 2021 |
pdf www |
Geneva: Evolving Censorship Evasion Strategies Kevin Bock, George Hughey, Xiao Qiang, Dave Levin ACM CCS 2019 (Conference on Computer and Communications Security) |
www |
Automatically Learning How to Evade Censorship Dave Levin USENIX ScAINet 2019 (Security and AI Networking Conference) |
pdf www |
DeTor: Provably Avoiding Geographic Regions in Tor Zhihao Li, Stephen Herwig, Dave Levin USENIX Security 2017 |
pdf www |
Ting: Measuring and Exploiting Latencies Between All Tor Nodes Frank Cangialosi, Dave Levin, Neil Spring ACM IMC 2015 (Internet Measurement Conference) Long paper |
pdf slides www |
Alibi Routing Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee ACM SIGCOMM 2015 |
pdf www |
No Root Store Left Behind James Larisch, Waqar Aqeel, Taejoong Chung, Eddie Kohler, Dave Levin, Bruce Maggs, Bryan Parno, Christo Wilson ACM HotNets 2023 |
pdf www |
Hammurabi: A Framework for Pluggable, Logic-based X.509 Certificate Validation Policies James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Kasra Torshizi, Leah Kannan, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson ACM CCS 2022 Best paper honorable mention |
pdf www |
A Comparative Analysis of Certificate Pinning in Android & iOS Amogh Pradeep, Muhammad Talha Paracha, Protick Bhowmick, Ali Davanian, Abbas Razaghpanah, Taejoong Chung, Martina Lindorfer, Narseo Vallina-Rodriguez, Dave Levin, David Choffnes ACM IMC 2022 (Internet Measurement Conference) Long paper |
pdf www |
Measurement and Analysis of Automated Certificate Reissuance Olamide Omolola, Richard Roberts, Ishtiaq Ashiq, Taejoong Chung, Dave Levin, Alan Mislove PAM 2021 (Passive and Active Measurement Conference) |
pdf www |
Mental Models of Domain Names and URLs Richard Roberts, Daniela Lulli, Abolee Raut, Kelsey Fulton, Dave Levin Poster at SOUPS 2020 (Symposium On Usable Privacy and Security) |
pdf www |
Assertion-Carrying Certificates Waqar Aqeel, Zachary Hanif, James Larisch, Olamide Omolola, Taejoong Chung, Dave Levin, Bruce Maggs, Alan Mislove, Bryan Parno, Christo Wilson FCS 2020 (Workshop on Foundations of Computer Security) |
pdf www |
.how .you .spot .whoswho .online .sucks: Deceiving Users with Generic Top-Level Domains Richard Roberts, Rachel Walter, Daniela Lulli, Dave Levin ConPro 2020 (Workshop on Technology and Consumer Protection) Accepted Talk |
pdf www |
A Deeper Look at Web Content Availability and Consistency over HTTP/S Muhammad Talha Paracha, Balakrishnan Chandrasekara, David Choffnes, Dave Levin TMA 2020 (Network Traffic Measurement and Analysis Conference) |
pdf www |
You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin ACM CCS 2019 (Conference on Computer and Communications Security) |
pdf www |
When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names Richard Roberts, Dave Levin WPES 2019 (Workshop on Privacy in the Electronic Society) Short paper |
pdf www |
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John P. Rula, Nick Sullivan ACM IMC 2019 (Internet Measurement Conference) Long paper |
Measuring TLS key exchange with post-quantum KEM Krzysztof Kwiatkowski, Nick Sullivan, Adam Langley, Dave Levin, Alan Mislove NIST Second PQC Standardization Conference, 2019 |
|
pdf www |
Is the Web Ready for OCSP Must Staple? Taejoong Chung, Jay Lok, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce Maggs, Alan Mislove, John Rula, Nick Sullivan, Christo Wilson ACM IMC 2018 (Internet Measurement Conference) Long paper |
cacm www |
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed Liang Zhang, David Choffnes, Tudor Dumitraş, Dave Levin, Alan Mislove, Aaron Schulman, Christo Wilson Communications of the ACM Research Highlights, March 2018, Vol. 61, No. 3 |
pdf www |
An End-to-End View of DNSSEC Ecosystem Management Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson USENIX ;login: Winter 2017, Vol. 42, No. 4 |
pdf www |
Understanding the Role of Registrars in DNSSEC Deployment Taejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Alan Mislove, Christo Wilson, Dave Levin, Bruce M. Maggs ACM IMC 2017 (Internet Measurement Conference) Long paper Applied Networking Research Prize 2019 |
pdf www |
A Longitudinal, End-to-End View of the DNSSEC Ecosystem Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson USENIX Security 2017 Distinguished paper award |
pdf www |
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers James Larisch, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson Oakland 2017 (IEEE Symposium on Security and Privacy) IEEE Cybersecurity Award for Innovation |
pdf www |
Measuring and Applying Invalid SSL Certificates: The Silent Majority Taejoong Chung, Yabing Liu, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson ACM IMC 2016 (Internet Measurement Conference) Long paper |
pdf www |
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem Frank Cangialosi, Taejoong Chung, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson ACM CCS 2016 (Conference on Computer and Communications Security) |
pdf www |
An End-to-End Measurement of Certificate Revocation in the Web's PKI Yabing Liu, Will Tome, Liang Zhang, David Choffnes, Dave Levin, Bruce Maggs, Alan Mislove, Aaron Schulman, Christo Wilson ACM IMC 2015 (Internet Measurement Conference) Long paper |
pdf www |
RevCast: Fast, Private Certificate Revocation over FM Radio Aaron Schulman, Dave Levin, Neil Spring ACM CCS 2014 (Conference on Computer and Communications Security) |
pdf www |
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed Liang Zhang, Dave Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, Christo Wilson ACM IMC 2014 (Internet Measurement Conference) Long paper |
The Ties that un-Bind: Decoupling IP from web services and sockets for robust addressing agility at CDN-scale Marwan Fayed, Lorenz Bauer, Vasileios Giotsas, Sami Kerola, Marek Majkowski, Pavel Odinstov, Jakub Sitnicki, Taejoong Chung, Dave Levin, Alan Mislove, Christopher A. Wood, Nick Sullivan ACM SIGCOMM 2021 |
|
Under the Hood of the Ethereum Gossip Protocol Lucianna Kiffer, Asad Salman, Dave Levin, Alan Mislove, Cristina Nita-Rotaru FC 2021 (Financial Cryptography and Data Security) |
|
pdf www |
Achieving Keyless CDNs with Conclaves Stephen Herwig, Christina Garman, Dave Levin USENIX Security 2020 |
Analyzing Ethereum's Contract Topology Lucianna Kiffer, Dave Levin, Alan Mislove ACM IMC 2018 (Internet Measurement Conference) Short paper |
|
Stick a fork in it: Analyzing the Ethereum network partition Lucianna Kiffer, Dave Levin, Alan Mislove ACM HotNets 2017 (Workshop on Hot Topics in Networks) |
|
pdf www |
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge Kevin Bock, Daven Patel, George Hughey, Dave Levin WOOT 2017 (USENIX Workshop on Offensive Technologies) |
Secure Sharing in Distributed Information Management Applications: Problems and Directions Piotr Mardziel, Adam Bender, Michael Hicks, Dave Levin, Mudhakar Srivatsa, Jonathan Katz ACITA 2010 (Annual Conference of the International Technology Alliance) |
|
pdf slides |
TrInc: Small Trusted Hardware for Large Distributed Systems Dave Levin, John R. Douceur, Jacob R. Lorch, Thomas Moscibroda NSDI 2009 (USENIX Symposium on Networked Systems Design and Implementation) Best paper award |
Accountability as a Service Adam Bender, Neil Spring, Dave Levin, Bobby Bhattacharjee SRUTI 2007 (Workshop on Steps to Reducing Unwanted Traffic on the Internet) |
Surveilling the Masses with Wi-Fi-Based Positioning Systems Erik Rye, Dave Levin Oakland 2024 (IEEE Symposium on Security and Privacy) |
|
pdf www |
IPv6 Hitlists at Scale: Be Careful What You Wish For Erik Rye, Dave Levin ACM SIGCOMM 2023 |
pdf www |
How to Count Bots in Longitudinal Datasets of IP Addresses Leon Böck, Dave Levin, Ramakrishna Padmanabhan, Christian Doerr, Max Mühlhäuser NDSS 2023 (Network and Distributed System Security Symposium) |
pdf www |
A Global Measurement of Routing Loops on the Internet Abdulrahman Alaraj, Kevin Bock, Dave Levin, Eric Wustrow PAM 2023 (Passive and Active Measurement Conference) |
Talk |
Insights and Experiences from Monitoring Multiple P2P Botnets Leon Böck, Shankar Karuppayah, Max Mühlhäuser, Dave Levin Botconf 2022 (The Botnet Fighting Conference) |
pdf www |
Sound Methodology for Downloading Webpages Soumya Indela, Dave Levin TMA 2021 (Network Traffic Measurement and Analysis Conference) |
pdf www |
Residential Links Under the Weather Ramakrishna Padmanabhan, Aaron Schulman, Dave Levin, Neil Spring ACM SIGCOMM 2019 |
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin NDSS 2019 (Network and Distributed System Security Symposium) Featured in IEEE Wireless Communication 2019's Scanning the Literature. |
|
pdf www |
How to find correlated Internet failures Ramakrishna Padmanabhan, Aaron Schulman, Alberto Dainotti, Dave Levin, Neil Spring PAM 2019 (Passive and Active Measurement Conference) |
pdf www |
Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee ACM SIGCOMM 2018 |
pdf www |
Anomaly Detection on D-root Zhihao Li, Dave Levin, Bobby Bhattacharjee, Neil Spring DINR Workshop 2016 (DNS and Internet Naming Research Directions) |
pdf www |
DNSql: Processing Massive DNS Collections Stephen Herwig, Dave Levin, Bobby Bhattacharjee, Neil Spring DINR Workshop 2016 (DNS and Internet Naming Research Directions) |
UAv6: Alias Resolution in IPv6 Using Unused Addresses Ramakrishna Padmanabhan, Zhihao Li, Dave Levin, Neil Spring PAM 2015 (Passive and Active Measurement Conference) |
|
pdf www |
D-mystifying the D-root Address Change Matthew Lentz, Dave Levin, Jason Castonguay, Neil Spring, Bobby Bhattacharjee ACM IMC 2013 (Internet Measurement Conference) Short paper |
pdf www |
Build It, Break It, Fix It: Contesting Secure Development James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton ACM Transactions on Privacy and Security (TOPS), March 2020 |
pdf www |
King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing Kevin Bock, George Hughey, Dave Levin USENIX ASE 2018 (Workshop on Advances in Security Education) |
pdf www |
Build It, Break It, Fix It: Contesting Secure Development Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel ACM CCS 2016 (Conference on Computer and Communications Security) |
pdf www |
Build It Break It: Measuring and Comparing Development Security Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Atif Memon, Jan Plane, Piotr Mardziel CSET 2015 (Workshop on Cyber Security Experimentation and Test) |
Picocenter: Supporting long-lived, mostly-idle applications in cloud environments Liang Zhang, James Litton, Frank Cangialosi, Theophilus Benson, Dave Levin, Alan Mislove EuroSys 2016 (European Conference on Computer Systems) |
|
Picocenter: Supporting Long-Lived, Mostly Idle Applications in Cloud Environments Liang Zhang, Frank Cangialosi, Theophilus Benson, Dave Levin, Alan Mislove ACM Symposium on Cloud Computing (SoCC) 2015 (poster) |
Programming Slick Network Functions Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin SOSR 2015 (Symposium on SDN Research) |
|
A Slick Control Plane for Network Middleboxes Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin, Jennifer Rexford HotSDN 2013 (Hot Topics in Software Defined Networking; poster) and ONS 2013 (Open Network Summit) |
|
SDX: A Software Defined Internet Exchange Nick Feamster, Jennifer Rexford, Scott Shenker, Dave Levin, Russ Clark, Josh Bailey ONS 2013 (Open Network Summit) |
Don't Love Thy Nearest Neighbor Cristian Lumezanu, Dave Levin, Bo Han, Neil Spring, Bobby Bhattacharjee IPTPS 2010 (International Workshop on Peer-to-Peer Systems) |
|
pdf
www |
Symbiotic Relationships in Internet Routing Overlays Cristian Lumezanu, Randolph Baden, Dave Levin, Neil Spring, Bobby Bhattacharjee NSDI 2009 (USENIX Symposium on Networked Systems Design and Implementation) |
pdf www |
PeerWise Discovery and Negotiation of Faster Paths Cristian Lumezanu, Dave Levin, Neil Spring HotNets 2007 (Workshop on Hot Topics in Networking) |
Making Currency Cheap with iOwe Dave Levin, Aaron Schulman, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee NetEcon 2011 (Workshop on The Economics of Networks, Systems, and Computation) |
|
Stay or go? Participation in Under-Provisioned Video Streams Dave Levin, Daniel Malter, Neil Spring, Bobby Bhattacharjee NetEcon 2009 (Workshop on The Economics of Networks, Systems, and Computation) |
|
Systems-Compatible Incentives Dave Levin, Neil Spring, Bobby Bhattacharjee GameNets 2009 (International Conference on Game Theory for Networks), Invited paper |
|
pdf slides www |
BitTorrent is an Auction: Analyzing and Improving BitTorrent's Incentives Dave Levin, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee ACM SIGCOMM 2008 |
pdf slides www |
Motivating Participation in Internet Routing Overlays Dave Levin, Randolph Baden, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee NetEcon 2008 (Workshop on the Economics of Networks, Systems, and Computation) |
Backbone Construction in Selfish Wireless Networks Seungjoon Lee, Dave Levin, Vijay Gopalakrishnan, Bobby Bhattacharjee SIGMETRICS 2007 (ACM International Conference on Measurement and Modeling of Computer Systems) |
|
pdf slides |
Boycotting and Extorting Nodes in an Internetwork Dave Levin, Adam Bender, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee NetEcon+IBC 2007 (Workshop on the Economics of Networked Systems and Incentive-Based Computing) |
pdf slides |
Punishment in Selfish Wireless Networks: A Game Theoretic Analysis Dave Levin NetEcon 2006 (Workshop on the Economics of Networked Systems) |
pdf www |
Fair File Swarming with FOX Dave Levin, Rob Sherwood, Bobby Bhattacharjee IPTPS 2006 (International Workshop on Peer-to-Peer Systems) |
pdf www |
On the Fidelity of 802.11 Packet Traces Aaron Schulman, Dave Levin, Neil Spring PAM 2008 (Passive and Active Measurement Conference) |
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks Deepti Chafekar, V. S. Anil Kumar, Dave Levin, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan INFOCOM 2008 (IEEE Conference on Computer Communications) |
pdf www |
Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones Richard Roberts, Julio Poveda, Raley Roberts, Dave Levin Oakland 2023 (IEEE Symposium on Security and Privacy) |
To appear |
As Advertised? Understanding the Impact of Influencer VPN Ads Omer Akgul, Richard Roberts, Emma Shroyer, Dave Levin, Michelle L. Mazurek USENIX Security 2025 |
Investigating Influencer VPN Ads on YouTube Omer Akgul, Richard Roberts, Moses Namara, Dave Levin, Michelle L. Mazurek Oakland 2022 (IEEE Symposium on Security and Privacy) |
|
pdf www |
ProofRite: A Paper-Augmented Word Processor Kevin Conroy, Dave Levin, François Guimbretière UIST 2004 Demo (ACM Symposium on User Interface Software and Technology) |