2024
Automatically Reasoning About How Systems Code Uses the CPU Cache
2024. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI’24), Santa Clara, CA, 2024-07-10 – 2024-07-12.Localizing Traffic Differentiation Practices on the Internet
Lausanne, EPFL, 2024.2023
Caching and Neutrality
2023. ACM Workshop on Hot Topics in Networks (HotNets), Cambridge, MA, USA, November 28-29, 2023. DOI : 10.1145/3626111.3628211.The Case for Performance Interfaces for Hardware Accelerators
2023. Workshop on Hot Topics in Operating Systems (HotOS), Providence, RI, USA, 2023-06-22. DOI : 10.1145/3593856.3595904.Localizing Traffic Differentiation
2023. ACM Internet Measurement Conference 2023, Montréal, Canada, October 24 – 26, 2023. p. 591 – 605. DOI : 10.1145/3618257.3624809.Using Gaming Footage as a Source of Internet Latency Information
2023. 2023 Internet Measurement Conference, Montréal, Canada, October 24 – 26, 2023. p. 606 – 626. DOI : 10.1145/3618257.3624816.Learning a QoE Metric from Social Media and Gaming Footage
2023. 22nd ACM Workshop on Hot Topics in Networks, Cambridge, Massachusetts, USA, November 28-29, 2023. p. 117 – 123. DOI : 10.1145/3626111.3628208.2022
Automated Verification of Network Function Binaries
2022. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Renton, WA, USA, April 4-6, 2022. p. 585 – 600.Performance Interfaces for Network Functions
2022. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Renton, WA, USA, April 4-6, 2022. p. 567 – 584.Toward Internet Performance Transparency
Lausanne, EPFL, 2022.2021
When to Hedge in Interactive Services
2021. 18th USENIX Symposium on Networked Systems Design and Implementation, Virtual Conference, April 12-14, 2021. p. 373 – 388.Group testing for connected communities
2021. 24th International Conference on Artificial Intelligence and Statistics (AISTATS), ELECTR NETWORK, Apr 13-15, 2021.An entropy reduction approach to continual testing
2021. IEEE International Symposium on Information Theory (ISIT), ELECTR NETWORK, Jul 12-20, 2021. p. 611 – 616. DOI : 10.1109/ISIT45174.2021.9518188.2020
Verification of Software Network Functions with No Verification Expertise
Lausanne, EPFL, 2020.2019
Verifying Software Network Functions with No Verification Expertise
2019. The 27th ACM Symposium on Operating Systems Principles (SOSP), Ontario, Canada, October 27-30, 2019. p. 275 – 290. DOI : 10.1145/3341301.3359647.Destination buffer analysis for packets rejection obliteration in multi-channel networks
Journal of The Franklin Institute-Engineering and Applied Mathematics. 2019. Vol. 356, num. 15, p. 8803 – 8828. DOI : 10.1016/j.jfranklin.2019.07.025.MorphIT: Morphing Packet Reports for Internet Transparency
2019. Privacy Enhancing Technologies Symposium (PETS), Stockholm, Sweden, July 16–20, 2019. p. 88 – 104. DOI : 10.2478/popets-2019-0021.Performance Contracts for Software Network Functions
2019. ACM Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, USA, February 26-28, 2019. p. 517 – 530.Retroactive Packet Sampling for Traffic Receipts
2019. ACM SIGMETRICS Conference, Phoenix, Arizona, USA, June 24-28, 2019. DOI : 10.1145/3322205.3311090.Traffic Locality as an Opportunity in the Data Center
Lausanne, EPFL, 2019.2018
Automated Synthesis of Adversarial Workloads for Network Functions
2018. ACM SIGCOMM Conference, Budapest, Hungary, 2018-08-21. DOI : 10.1145/3230543.3230573.Traffic Receipts for Network Transparency
Lausanne, EPFL, 2018.Network Neutrality Inference using Network Tomography
Lausanne, EPFL, 2018.ResQ: Enabling SLOs in Network Function Virtualization
2018. USENIX Symposium on Networked Systems Design and Implementation, Renton, WA, Apr 09-11, 2018. p. 283 – 297.Adding flexibility to multi-tenant networks
Lausanne, EPFL, 2018.2017
How to Measure the Killer Microsecond
2017. ACM SIGCOMM 2017 Workshop on Kernel-Bypass Networks (KBNets’17), Los Angeles, CA, USA, August 21, 2017. p. 37 – 42. DOI : 10.1145/3098583.3098590.Generating Steganographic Text with LSTMs
2017. ACL Student Research Workshop 2017, Vancouver, Canada, July 30-August 4, 2017. p. 100 – 106. DOI : 10.18653/v1/P17-3017.A Formally Verified NAT
2017. ACM SIGCOMM Conference, Los Angeles, CA, USA, August 21-25, 2017. DOI : 10.1145/3098822.3098833.2016
Creating Secrets Out Of Packet Erasures
IEEE Transactions on Information Forensics and Security. 2016. Vol. 11, num. 6, p. 1177 – 1191. DOI : 10.1109/TIFS.2016.2520887.Building Security Protocols Against Powerful Adversaries
Lausanne, EPFL, 2016.VNToR: Network Virtualization at the Top-of-Rack Switch
2016. ACM Symposium on Cloud Computing. DOI : 10.1145/2987550.2987582.Matryoshka: Hiding Secret Communication in Plain Sight
2016. 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI), Austin, Texas, USA, August 8, 2016.2015
Transparency Instead of Neutrality
2015. ACM Workshop on Hot Topics in Networks (HotNets), Philadelphia, Pennsylvania, USA, November 16-17. DOI : 10.1145/2834050.2834082.Towards Unconditional Tor-Like Anonymity
2015. The 2015 IEEE International Sumposium on Network Coding (NetCod) – Invited Paper, Sydney, Australia, June 22-24, 2015. p. 66 – 70. DOI : 10.1109/NETCOD.2015.7176791.Building Evolvable Networks : Flexible and Predictable Packet Processing
Lausanne, EPFL, 2015.Efficient Key Exchange for Wireless Multi-hop Networks
2015
Software Dataplane Verification
Communications Of The Acm. 2015. Vol. 58, num. 11, p. 113 – 121. DOI : 10.1145/2823400.2014
Software Dataplane Verification
2014. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, USA, April 2-4, 2014.Software Dataplane Verification
2014
Network Neutrality Inference
2014
Network Neutrality Inference
2014. ACM SIGCOMM Conference, Chicago, Illinois, USA, August 19-21, 2014. DOI : 10.1145/2619239.2626308.2013
Creating Secrets out of Erasures
2013. ACM Conference on Mobile Computing and Networking (MobiCom), Miami, Florida, USA, September 30 – October 4. p. 429 – 440. DOI : 10.1145/2500423.2500440.Toward a Verifiable Software Dataplane
2013. ACM Workshop on Hot Topics in Networks, College Park, Maryland, USA, November 21-22, 2013. DOI : 10.1145/2535771.2535777.SenseCode: Network Coding for Reliable Sensor Networks
Acm Transactions On Sensor Networks. 2013. Vol. 9, num. 2, p. 25. DOI : 10.1145/2422966.2422982.Exchanging Pairwise Secrets Efficiently
2013. The 32nd Annual IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April 14-19, 2013. p. 2265 – 2273. DOI : 10.1109/INFCOM.2013.6567030.2012
Toward Predictable Performance in Software Packet-Processing Platforms
2012
Optinal Source-Based Filtering of Malicious Traffic
IEEE ACM Transactions on Networking. 2012. Vol. 20, num. 2, p. 381 – 395. DOI : 10.1109/TNET.2011.2161615.Toward Predictable Performance in Software Packet-Processing Platforms
2012. USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, USA, April 25-27, 2012.Creating Shared Secrets out of Thin Air
2012. ACM Workshop on Hot Topics in Networks (HotNets), Redmond, WA, USA, October 29-30, 2012. p. 73 – 78. DOI : 10.1145/2390231.2390244.Practical Network Tomography
Lausanne, EPFL, 2012.2011
Shifting Network Tomography Toward A Practical Goal
2011. ACM International Conference on emerging Networking EXperiments and Technologies (CoNext), Tokyo, Japan, December 6–9, 2011. DOI : 10.1145/2079296.2079320.2010
Verifiable Network-Performance Measurements
2010
Verifiable Network-Performance Measurements
2010. ACM International Conference on emerging Networking EXperiments and Technologies (CoNext), Philadelphia, PA, USA, November 30 – December 3, 2010. DOI : 10.1145/1921168.1921170.Controlling Parallelism on Multi-core Software Routers
2010. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Philadelphia, PA, USA, November 30, 2010. DOI : 10.1145/1921151.1921154.Evaluating the Suitability of Server Network Cards for Software Routers
2010. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Philadelphia, PA, USA, November 30, 2010. DOI : 10.1145/1921151.1921161.Erased Secrets: Practical Information-Theoretic Group Secrecy
2010
Group Secret Key Generation over Broadcast Erasure Channels
2010. Asilomar Conference on Signals, Systems, and Computers, November 7-10, 2010. p. 719 – 723. DOI : 10.1109/ACSSC.2010.5757657.Joint Identity-Message Coding for Sensor Networks
IEEE Journal on Selected Areas in Communications. 2010. Vol. 28, num. 7, p. 1083 – 1093. DOI : 10.1109/JSAC.2010.100913.Netscope: Practical Network Loss Tomography
2010. IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, USA, March 15-19, 2010. DOI : 10.1109/INFCOM.2010.5461918.Network Tomography on Correlated Links
2010. ACM Internet Measurement Conference (IMC), Melbourne, Australia, November 1-3, 2010. p. 225 – 238. DOI : 10.1145/1879141.1879170.2009
Optimal Filtering of Source Address Prefixes: Models and Algorithms
2009. IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25. DOI : 10.1109/INFCOM.2009.5062172.Compressed network coding vectors
2009. IEEE International Symposium on Information Theory (ISIT’09), Seoul, Korea, June 28-July 3, 2009. p. 109 – 113. DOI : 10.1109/ISIT.2009.5206041.SenseCode: Network Coding for Reliable Sensor Networks
2009
RouteBricks: Exploiting Parallelism to Scale Software Routers
2009. ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, USA, October 11-14, 2009. p. 15 – 28. DOI : 10.1145/1629575.1629578.Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks
IEEE/ACM Transactions on Networking. 2009. Vol. 17, num. 4, p. 1284 – 1297. DOI : 10.1109/TNET.2008.2007431.Identity Aware Sensor Networks
2009. IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25, 2009. DOI : 10.1109/INFCOM.2009.5062142.2008
Identity Aware Sensor Networks
2008