Search Results - "Choffnes, David"
-
1
CDNs Meet CN An Empirical Study of CDN Deployments in China
Published in IEEE access (2017)“…Today's content delivery networks (CDNs) use large sets of globally distributed servers, advanced routing techniques, and dynamic server selection to provide…”
Get full text
Journal Article -
2
A Measurement Experimentation Platform at the Internet's Edge
Published in IEEE/ACM transactions on networking (01-12-2015)“…Poor visibility into the network hampers progress in a number of important research areas, from network troubleshooting to Internet topology and performance…”
Get full text
Journal Article -
3
Impact of heterogeneity and socioeconomic factors on individual behavior in decentralized sharing ecosystems
Published in Proceedings of the National Academy of Sciences - PNAS (28-10-2014)“…Tens of millions of individuals around the world use decentralized content distribution systems, a fact of growing social, economic, and technological…”
Get full text
Journal Article -
4
Where the Sidewalk Ends: Extending theInternet AS Graph Using Traceroutesfrom P2P Users
Published in IEEE transactions on computers (01-04-2014)“…An accurate Internet topology graph is important in many areas of networking, from understanding ISP business relationships to diagnosing network anomalies…”
Get full text
Journal Article -
5
Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems
Published in 2010 Proceedings IEEE INFOCOM (01-03-2010)“…Network positioning systems provide an important service to large- scale P2P systems, potentially enabling clients to achieve higher performance, reduce…”
Get full text
Conference Proceeding -
6
A SCIENTIFIC APPROACH TO TECH ACCOUNTABILITY
Published in Harvard journal of law & technology (22-06-2023)“…The Federal Trade Commission can only do so much to hold tech companies accountable. Enforcement agencies and the people they protect need help. One problem is…”
Get full text
Journal Article -
7
Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…Consumer Internet of Things (IoT) devices are increasingly common, from smart speakers to security cameras, in homes. Along with their benefits come potential…”
Get full text
Conference Proceeding -
8
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
Published in 2017 IEEE Symposium on Security and Privacy (SP) (01-05-2017)“…Currently, no major browser fully checks for TLS/SSL certificate revocations. This is largely due to the fact that the deployed mechanisms for disseminating…”
Get full text
Conference Proceeding -
9
Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting
Published in Computer networks (Amsterdam, Netherlands : 1999) (09-10-2016)Get full text
Journal Article -
10
Enhancing the ethics of user-sourced online data collection and sharing
Published in Nature Computational Science (01-08-2023)Get full text
Journal Article -
11
Drafting Behind Akamai: Inferring Network Conditions Based on CDN Redirections
Published in IEEE/ACM transactions on networking (01-12-2009)“…To enhance Web browsing experiences, content distribution networks (CDNs) move Web content ¿closer¿ to clients by caching copies of Web objects on thousands of…”
Get full text
Journal Article -
12
Interplay of Mg^sup 2+^, ADP, and ATP in the cytosol and mitochondria: Unravelling the role of Mg^sup 2+^ in cell respiration
Published in Proceedings of the National Academy of Sciences - PNAS (28-10-2014)“…In animal and plant cells, the ATP/ADP ratio and/or energy charge are generally considered key parameters regulating metabolism and respiration. The major…”
Get full text
Journal Article -
13
Janus: Network- and application-aware multi-TCP optimization engine
Published in 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (01-04-2016)“…We present Janus, a system that adaptively selects and optimizes TCP implementations using existing off-the-shelf TCP versions based on observed network…”
Get full text
Conference Proceeding -
14
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses
Published in 2021 IEEE European Symposium on Security and Privacy (EuroS&P) (01-09-2021)“…Programmable Logic Controllers (PLCs) play a critical role in the industrial control systems. Vulnerabilities in PLC programs might lead to attacks causing…”
Get full text
Conference Proceeding -
15
Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards
Published 06-04-2023“…Consumer Internet of Things (IoT) devices are increasingly common, from smart speakers to security cameras, in homes. Along with their benefits come potential…”
Get full text
Journal Article -
16
Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants
Published 11-09-2024“…Many companies, including Google, Amazon, and Apple, offer voice assistants as a convenient solution for answering general voice queries and accessing their…”
Get full text
Journal Article -
17
SunBlock: Cloudless Protection for IoT Systems
Published 25-01-2024“…With an increasing number of Internet of Things (IoT) devices present in homes, there is a rise in the number of potential information leakage channels and…”
Get full text
Journal Article -
18
Not Your Average App: A Large-scale Privacy Analysis of Android Browsers
Published 07-12-2022“…The transparency and privacy behavior of mobile browsers has remained widely unexplored by the research community. In fact, as opposed to regular Android apps,…”
Get full text
Journal Article -
19
Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources
Published 12-05-2019“…When does Internet traffic cross international borders? This question has major geopolitical, legal and social implications and is surprisingly difficult to…”
Get full text
Journal Article -
20
Client-Side Web Proxy Detection from Unprivileged Mobile Devices
Published 13-11-2015“…Mobile devices that connect to the Internet via cellular networks are rapidly becoming the primary medium for accessing Web content. Cellular service providers…”
Get full text
Journal Article