Measurement and analysis of Hajime, a peer-to-peer IoT botnet S Herwig, K Harvey, G Hughey, R Roberts, D Levin Network and Distributed Systems Security (NDSS) Symposium, 2019 | 209 | 2019 |
Achieving Keyless {CDNs} with Conclaves S Herwig, C Garman, D Levin 29th USENIX Security Symposium (USENIX Security 20), 735-751, 2020 | 27 | 2020 |
DeTor: Provably Avoiding Geographic Regions in Tor Z Li, S Herwig, D Levin 26th USENIX Security Symposium (USENIX Security 17), 343-359, 2017 | 24 | 2017 |
Bento: Safely bringing network function virtualization to Tor M Reininger, A Arora, S Herwig, N Francino, J Hurst, C Garman, D Levin Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 821-835, 2021 | 11 | 2021 |
secmodel_sandbox: An application sandbox for NetBSD S Herwig Proceedings of the 14th BSDCan. Ottawa, June, 2017 | 3 | 2017 |
Towards Protecting Billions and Billions of Bits on the Interplanetary Internet S Herwig Workshop on Security of Space and Satellite Systems (SpaceSec) 2023, 2023 | | 2023 |
Execution Environments for Running Legacy Applications in Multi-Party Trust Settings S Herwig University of Maryland, College Park, 2021 | | 2021 |
Bento: Bringing Network Function Virtualization to Tor M Reininger, A Arora, S Herwig, N Francino, C Garman, D Levin Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | | 2020 |
DNSql: Processing Massive DNS Collections S Herwig, D Levin, B Bhattacharjee, N Spring DNS And Internet Naming Research Directions (DINR) Workshop, 2016, 2016 | | 2016 |
Scaling Computation of Graph Structured Data with NScale K Xirogiannopoulos, SM Herwig, BC Chen, M Shao | | 2015 |