To appear |
Detecting Network Interference Without Endpoint Participation Sadia Nourin, Kevin Bock, Nguyen Phong Hoang, Dave Levin FOCI 2023 (Workshop on Free and Open Communication on the Internet) |
To appear |
Collateral Damage of Russian Censorship Aaron Ortwein, Kevin Bock, Dave Levin FOCI 2023 (Workshop on Free and Open Communication on the Internet) |
To appear |
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies Nhi Tran, Kevin Bock, Dave Levin FOCI 2023 (Workshop on Free and Open Communication on the Internet) |
pdf www |
Measuring and Evading Turkmenistan's Internet Censorship Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin WWW 2023 (The Web Conference) |
pdf www |
Hammurabi: A Framework for Pluggable, Logic-based X.509 Certificate Validation Policies James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Kasra Torshizi, Leah Kannan, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson ACM CCS 2022 Best paper honorable mention |
pdf www |
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin USENIX Security 2022 |
pdf www |
Even Censors Have a Backup: Examining the GFW’s Double HTTPS Censorship System Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin FOCI 2021 (ACM Workshop on Free and Open Communications on the Internet) |
pdf www |
Bento: Safely Bringing Network Function Virtualization to Tor Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Christina Garman, Dave Levin ACM SIGCOMM 2021 |
pdf www |
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin WOOT 2021 (IEEE Workshop on Offensive Technologies) |
pdf www |
Weaponizing Middleboxes for TCP Reflected Amplification Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin USENIX Security 2021 Distinguished paper award Internet Defense Prize |
pdf www |
Mental Models of Domain Names and URLs Richard Roberts, Daniela Lulli, Abolee Raut, Kelsey Fulton, Dave Levin Poster at SOUPS 2020 (Symposium On Usable Privacy and Security) |
pdf www |
Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin FOCI 2020 (USENIX Workshop on Free and Open Communications on the Internet) |
pdf www |
Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin ACM SIGCOMM 2020 Applied Networking Research Prize 2021 |
pdf www |
.how .you .spot .whoswho .online .sucks: Deceiving Users with Generic Top-Level Domains Richard Roberts, Rachel Walter, Daniela Lulli, Dave Levin ConPro 2020 (Workshop on Technology and Consumer Protection) Accepted Talk |
www |
Geneva: An AI Approach to Evading Nation-State Censorship Kevin Bock, George Hughey BlueHat IL 2020 |
pdf www |
Geneva: Evolving Censorship Evasion Strategies Kevin Bock, George Hughey, Xiao Qiang, Dave Levin ACM CCS 2019 (Conference on Computer and Communications Security) |
pdf www |
You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin ACM CCS 2019 (Conference on Computer and Communications Security) |
Learning Nation-State Censorship with Genetic Algorithms Kevin Bock, George Hughey AIMS 2019 (Workshop on Active Internet Measurements) |
|
pdf www |
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin NDSS 2019 (Network and Distributed System Security Symposium) |
www |
Target-Embedding Domain Impersonation in HTTPS Certificates Richard Roberts, Yaelle Goldschlag, Dave Levin Poster at ACM IMC 2018 (Internet Measurement Conference) |
poster www |
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin Poster at ACM IMC 2018 (Internet Measurement Conference) |
www |
Detecting IoT Malware with Power Measurements Rebecca Gelles, Kelsey Fulton, Rachel Walter, Dave Levin Poster at ACM IMC 2018 (Internet Measurement Conference) |
www |
Revocation Checking - why is this still so hard? Kevin Bock HotSec 2018 (USENIX Summit on Hot Topics in Security) |
pdf www |
King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing Kevin Bock, George Hughey, Dave Levin USENIX ASE 2018 (Workshop on Advances in Security Education) |