default search action
Nicholas Weaver
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Nicholas Weaver:
Escalating complexity and fragmentation of mental health service systems: the role of recovery as a form of moral communication. Kybernetes 51(5): 1800-1813 (2022) - [i5]Julien Piet, Jaiden Fairoze, Nicholas Weaver:
Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value. CoRR abs/2203.15930 (2022) - 2021
- [c54]Arian Akhavan Niaki, William R. Marczak, Sahand Farhoodi, Andrew McGregor, Phillipa Gill, Nicholas Weaver:
Cache Me Outside: A New Look at DNS Cache Probing. PAM 2021: 427-443
2010 – 2019
- 2018
- [j8]Nicholas Weaver:
Risks of cryptocurrencies. Commun. ACM 61(6): 20-24 (2018) - [c53]Michael Carl Tschantz, Serge Egelman, Jaeyoung Choi, Nicholas Weaver, Gerald Friedland:
The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. WPES@CCS 2018: 33-41 - [i4]Michael Carl Tschantz, Serge Egelman, Jaeyoung Choi, Nicholas Weaver, Gerald Friedland:
The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. CoRR abs/1808.07549 (2018) - [i3]Jaeyoung Choi, Istemi Ekin Akkus, Serge Egelman, Gerald Friedland, Robin Sommer, Michael Carl Tschantz, Nicholas Weaver:
Cybercasing 2.0: You Get What You Pay For. CoRR abs/1811.06584 (2018) - 2017
- [j7]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global-Scale Measurement of DNS Manipulation. login Usenix Mag. 42(4) (2017) - [c52]Jill Jermyn, Nicholas Weaver:
Autosonda: Discovering Rules and Triggers of Censorship Devices. FOCI @ USENIX Security Symposium 2017 - [c51]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global Measurement of DNS Manipulation. USENIX Security Symposium 2017: 307-323 - [e1]Jon Penney, Nicholas Weaver:
7th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2017, Vancouver, BC, Canada, August 14, 2017. USENIX Association 2017 [contents] - 2016
- [c50]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson:
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. CCS 2016: 1516-1527 - [c49]Khaled Baqer, Danny Yuxing Huang, Damon McCoy, Nicholas Weaver:
Stressing Out: Bitcoin "Stress Testing". Financial Cryptography Workshops 2016: 3-18 - [c48]Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Internet Measurement Conference 2016: 215-229 - [c47]Ben Jones, Nick Feamster, Vern Paxson, Nicholas Weaver, Mark Allman:
Detecting DNS Root Manipulation. PAM 2016: 276-288 - [i2]Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Multi-perspective Analysis of Carrier-Grade NAT Deployment. CoRR abs/1605.05606 (2016) - 2015
- [c46]Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson:
Examining How the Great Firewall Discovers Hidden Circumvention Servers. Internet Measurement Conference 2015: 445-458 - [c45]Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Nicholas Weaver, Vern Paxson:
Beyond the Radio: Illuminating the Higher Layers of Mobile Networks. MobiSys 2015: 375-387 - [c44]Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nicholas Weaver:
Ethical Concerns for Censorship Measurement. NS Ethics@SIGCOMM 2015: 17-19 - [c43]Ryan Rasti, Mukul Murthy, Nicholas Weaver, Vern Paxson:
Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks. IEEE Symposium on Security and Privacy 2015: 187-198 - [c42]Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Hai-Xin Duan, Shuo Chen, Tao Wan, Nicholas Weaver:
Cookies Lack Integrity: Real-World Implications. USENIX Security Symposium 2015: 707-721 - [i1]Istemi Ekin Akkus, Nicholas Weaver:
The Case for a General and Interaction-based Third-party Cookie Policy. CoRR abs/1506.04107 (2015) - 2014
- [c41]Narseo Vallina-Rodriguez, Johanna Amann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Tangled Mass: The Android Root Certificate Stores. CoNEXT 2014: 141-148 - [c40]Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael D. Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:
The Matter of Heartbleed. Internet Measurement Conference 2014: 475-488 - [c39]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - [c38]Nicholas Weaver, Christian Kreibich, Martin Dam, Vern Paxson:
Here Be Web Proxies. PAM 2014: 183-192 - 2013
- [c37]Arthur W. Berger, Nicholas Weaver, Robert Beverly, Larry Campbell:
Internet nameserver IPv4 and IPv6 address relationships. Internet Measurement Conference 2013: 91-104 - [c36]Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver:
Practical Comprehensive Bounds on Surreptitious Communication over DNS. USENIX Security Symposium 2013: 17-32 - 2012
- [c35]Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, Vern Paxson:
Fathom: a browser-based network measurement platform. Internet Measurement Conference 2012: 73-86 - [c34]Tristan Halvorson, Janos Szurdi, Gregor Maier, Márk Félegyházi, Christian Kreibich, Nicholas Weaver, Kirill Levchenko, Vern Paxson:
The BIZ Top-Level Domain: Ten Years Later. PAM 2012: 221-230 - [c33]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - 2011
- [j6]Vint Cerf, Van Jacobson, Nicholas Weaver, Jim Gettys:
BufferBloat: What's Wrong with the Internet? ACM Queue 9(12): 10 (2011) - [c32]Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, Vern Paxson:
GQ: practical containment for measuring modern malware systems. Internet Measurement Conference 2011: 397-412 - [c31]Gerald Friedland, Gregor Maier, Robin Sommer, Nicholas Weaver:
Sherlock holmes' evil twin: on the impact of global inference for online privacy. NSPW 2011: 105-114 - [c30]Christian Kreibich, Nicholas Weaver, Gregor Maier, Boris Nechaev, Vern Paxson:
Experiences from Netalyzr with engaging users in end-system measurement. W-MUST@SIGCOMM 2011: 25-30 - [c29]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c28]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c27]Nicholas Weaver, Christian Kreibich, Vern Paxson:
Redirecting DNS for Ads and Profit. FOCI 2011 - 2010
- [c26]Christian Kreibich, Nicholas Weaver, Boris Nechaev, Vern Paxson:
Netalyzr: illuminating the edge network. Internet Measurement Conference 2010: 246-259 - [c25]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010
2000 – 2009
- 2009
- [j5]Robin Sommer, Vern Paxson, Nicholas Weaver:
An architecture for exploiting multi-core processors to parallelize network intrusion prevention. Concurr. Comput. Pract. Exp. 21(10): 1255-1279 (2009) - [c24]Joakim Koskela, Nicholas Weaver, Andrei V. Gurtov, Mark Allman:
Securing web content. ReArch@CoNEXT 2009: 7-12 - [c23]Nicholas Weaver, John H. Kelm, Matthew I. Frank:
Emµcode: Masking hard faults in complex functional units. DSN 2009: 458-467 - [c22]Nicholas Weaver, Robin Sommer, Vern Paxson:
Detecting Forged TCP Reset Packets. NDSS 2009 - [c21]Nicholas Weaver:
Think Evil (tm). SOUPS 2009 - 2008
- [c20]Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver:
Principles for Developing Comprehensive Network Visibility. HotSec 2008 - 2007
- [c19]José M. González, Vern Paxson, Nicholas Weaver:
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. CCS 2007: 139-149 - [c18]Nicholas Weaver, Vern Paxson, José M. González:
The shunt: an FPGA-based accelerator for network intrusion prevention. FPGA 2007: 199-206 - [c17]Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver:
The Strengths of Weaker Identities: Opportunistic Personas. HotSec 2007 - [c16]Nicholas Weaver, Robin Sommer:
Stress Testing Cluster Bro. DETER 2007 - [p1]Nicholas Weaver, Stuart Staniford, Vern Paxson:
Very Fast Containment of Scanning Worms, Revisited. Malware Detection 2007: 113-145 - 2006
- [j4]Nicholas Weaver, Dan Ellis:
White Worms Don't Work. login Usenix Mag. 31(6) (2006) - [c15]Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz:
Protocol-Independent Adaptive Replay of Application Dialog. NDSS 2006 - [c14]Nicholas Weaver, Vern Paxson, Robin Sommer:
Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic. SecureComm 2006: 1-2 - [c13]Vern Paxson, Krste Asanovic, Sarang Dharmapurikar, John W. Lockwood, Ruoming Pang, Robin Sommer, Nicholas Weaver:
Rethinking Hardware Support for Network Analysis and Intrusion Prevention. HotSec 2006 - 2005
- [c12]Abhishek Kumar, Vern Paxson, Nicholas Weaver:
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. Internet Measurement Conference 2005: 351-364 - 2004
- [j3]Nicholas Weaver:
The Kadison-Singer problem in discrepancy theory. Discret. Math. 278(1-3): 227-239 (2004) - [j2]Nicholas Weaver, Dan Ellis:
Reflections on Witty. login Usenix Mag. 29(3) (2004) - [c11]Nicholas Weaver, John R. Hauser, John Wawrzynek:
The SFRA: a corner-turn FPGA architecture. FPGA 2004: 3-12 - [c10]Nicholas Weaver, Dan Ellis, Stuart Staniford, Vern Paxson:
Worms vs. perimeters: the case for hard-LANs. Hot Interconnects 2004: 70-76 - [c9]Nicholas Weaver, Stuart Staniford, Vern Paxson:
Very Fast Containment of Scanning Worms. USENIX Security Symposium 2004: 29-44 - [c8]Stuart Staniford, David Moore, Vern Paxson, Nicholas Weaver:
The top speed of flash worms. WORM 2004: 33-42 - [c7]Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson:
Preliminary results using scale-down to explore worm dynamics. WORM 2004: 65-72 - 2003
- [j1]David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver:
Inside the Slammer Worm. IEEE Secur. Priv. 1(4): 33-39 (2003) - [c6]Nicholas Weaver, Yury Markovsky, Yatish Patel, John Wawrzynek:
Post-placement C-slow retiming for the xilinx virtex FPGA. FPGA 2003: 185-194 - [c5]Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham:
A taxonomy of computer worms. WORM 2003: 11-18 - 2002
- [c4]Nicholas Weaver, John Wawrzynek:
The Effects of Datapath Placement and C-Slow Retiming on Three Computational Benchmarks. FCCM 2002: 303- - [c3]Stuart Staniford, Vern Paxson, Nicholas Weaver:
How to Own the Internet in Your Spare Time. USENIX Security Symposium 2002: 149-167 - 2000
- [c2]Nicholas Weaver, John Wawrzynek:
A Comparison of the AES Candidates Amenability to FPGA Implementation. AES Candidate Conference 2000: 28-39
1990 – 1999
- 1998
- [c1]Michael Chu, Nicholas Weaver, Kolja Sulimma, André DeHon, John Wawrzynek:
Object Oriented Circuit-Generators in Java. FCCM 1998: 158-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint