|
|
|
Vern Paxson
Professor
Research Areas
Research Centers
- Center for Evidence-based Security Research (CESR)
Teaching Schedule
(Spring 2013)
Selected Publications
- C. Y. Cho, C. Juan, G. Chris, V. Paxson, and D. Song, "Insights from the Inside: A View of Botnet Management from Infiltration," in 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010.
- C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage, "Spamalytics: An Empirical Analysis of Spam Marketing Conversion," Communications of the ACM, vol. 52, no. 9, pp. 99-107, Sep. 2009.
- V. Paxson, "Considerations and pitfalls for conducting intrusion detection research (Keynote Address)," presented at 4th GI Intl. Conf. on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, July 2007.
- R. Pang, V. Paxson, R. Sommer, and L. Peterson, "binpac: A yacc for writing application protocol parsers," in Proc. 6th AMC SIGCOMM Internet Measurement Conf. (IMC '06), New York, NY: The Association for Computing Machinery, Inc., 2006, pp. 289-300.
- V. Paxson, "End-to-end routing behavior in the Internet (2006 ACM SIGCOMM Test of Time Awardee)," ACM SIGCOMM Computer Communication Review, vol. 36, no. 5, pp. 43-56, Oct. 2006.
- H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer, "Dynamic application-layer protocol analysis for network intrusion detection," in Proc. 15th USENIX Security Symp., Vol. 15, Berkeley, CA: USENIX Association, 2006, pp. 257-272.
- V. Paxson, K. Asanovic, S. Dharmapurikar, J. W. Lockwood, R. Pang, R. Sommer, and N. Weaver, "Rethinking hardware support for network analysis and intrusion prevention," in Proc. 1st USENIX Workshop on Hot Topics in Security (HotSec '06), Berkeley, CA: USENIX Association, 2006, pp. 63-68.
- R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization," ACM SIGCOMM Computer Communication Review, vol. 36, no. 1, pp. 29-38, Jan. 2006.
- R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney, "A first look at modern enterprise traffic," in Proc. 5th ACM Internet Measurement Conf. (IMC '05), Berkeley, CA: USENIX Association, 2005, pp. 15-28.
- S. Dharmapurikar and V. Paxson, "Robust TCP stream reassembly in the presence of adversaries," in Proc. 14th USENIX Security Symp., Vol. 14, Berkeley, CA: USENIX Association, 2005, pp. 65-80.
- V. Paxson, "Strategies for sound Internet measurement," in Proc. 4th ACM SIGCOMM Internet Measurement Conf. (IMC '04), New York, NY: The Association for Computing Machinery, Inc., 2004, pp. 263-271.
- J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proc. 2004 IEEE Symp. on Security and Privacy (S&P 2004), Los Alamitos, CA: IEEE Computer Society, 2004, pp. 211-225.
- S. Staniford, V. Paxson, and N. Weaver, "How to 0wn the Internet in your spare time," in Proc. 11th USENIX Security Symp., Vol. 11, Berkeley, CA: USENIX Association, 2002, pp. 149-167.
- S. Floyd and V. Paxson, "Difficulties in simulating the Internet," IEEE/ACM Trans. Networking, vol. 9, no. 4, pp. 392-403, Aug. 2001.
- M. Handley, V. Paxson, and C. Kreibich, "Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics," in Proc. 10th USENIX Security Symp., Vol. 10, Berkeley, CA: USENIX Association, 2001, pp. 115-131.
- Y. Zhang and V. Paxson, "Detecting stepping stones," in Proc. 9th USENIX Security Symp., Vol. 9, Berkeley, CA: USENIX Association, 2000, pp. 15 pg.
- V. Paxson, "End-to-end Internet packet dynamics," IEEE/ACM Trans. Networking, vol. 7, no. 3, pp. 277-292, June 1999.
- V. Paxson, "Best Paper Award: Bro: A system for detecting network intruders in real-time," in Proc. 7th USENIX Security Symp., Vol. 7, Berkeley, CA: USENIX Association, 1998, pp. 21 pg.
- V. Paxson and S. Floyd, "Wide area traffic: The failure of Poisson modeling," IEEE/ACM Trans. Networking, vol. 3, no. 3, pp. 226-244, June 1995.
|
|
|
|