Vern Paxson

Results: 154



#Item
1Computer network security / Cyberwarfare / Computing / Computer security / Firewall software / Internet censorship in China / Great Firewall / Transmission Control Protocol / Intrusion detection system / Packet injection / Internet protocol suite / Firewall

Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Sheharbano Khattak∗ ∗ Independent researcher Philip D. Anderson∗ Vern Paxson†

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:12
2Security / Security breaches / Malware / Computer network security / Cybercrime / Multi-agent systems / Spamming / Rogue software / Botnet / Antivirus software / Rogue security software / Computer virus

Measuring Pay-per-Install: The Commoditization of Malware Distribution Juan Caballero† , Chris Grier∗‡ , Christian Kreibich∗‡ , Vern Paxson∗‡ † IMDEA Software Institute ∗ UC Berkeley ‡ ICSI juan.cabal

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2011-06-09 13:31:25
3

Do You See What I See? Differential Treatment of Anonymous Users Sheharbano Khattak? , David Fifield† , Sadia Afroz† , Mobin Javed† Srikanth Sundaresan‡ , Vern Paxson‡† , Steven J. Murdoch- , Damon McCoy‡ o

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:26
    4Domain name system / Internet / Computing / Network architecture / Name server / DNS hijacking / Google Public DNS / Denial-of-service attack / DNS root zone / Root name server / OpenDNS / Hosts

    Global Measurement of DNS Manipulation Paul Pearce Ben Jones† Frank Li Roya Ensafi† Nick Feamster† Nick Weaver‡ Vern Paxson  University

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2017-06-30 16:05:22
    5

    Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2017-06-30 16:01:04
      6Computing / Internet privacy / Digital rights / Proxy servers / Internet censorship / Internet / Secure communication / Great Firewall / Internet censorship circumvention / Telex / Tor / Flash proxy

      1 SoK: Towards Grounding Censorship Circumvention in Empiricism Michael Carl Tschantz∗ , Sadia Afroz∗ , Anonymous‡ , and Vern Paxson∗† ∗ International Computer Science Institute

      Add to Reading List

      Source URL: internet-freedom-science.org

      Language: English - Date: 2016-04-13 13:52:54
      7Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite

      Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:56:26
      8

      On the Potential Abuse of IGMP Matthew Sargent† , John Kristoff§ , Vern Paxson‡,¶ , Mark Allman‡ † Case Western Reserve University, § DePaul University, ‡ International Computer Science Institute, ¶ Univers

      Add to Reading List

      Source URL: aharp.iorc.depaul.edu

      Language: English - Date: 2017-07-25 20:43:13
        9

        Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

        Add to Reading List

        Source URL: ensa.fi

        Language: English - Date: 2017-04-10 11:00:44
          10Computing / Cyberwarfare / Security engineering / Computer security / Carnegie Mellon University / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer emergency response team / IPv6 / WHOIS / United States Computer Emergency Readiness Team

          You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li† Zakir Durumeric∗‡? Jakub Czyz∗ Mohammad Karami Michael Bailey‡ Damon McCoy. Stefan Savage◦ Vern Paxson†? of California

          Add to Reading List

          Source URL: mdbailey.ece.illinois.edu

          Language: English - Date: 2016-10-12 00:39:36
          UPDATE