Author image not provided
 Nick Greer Feamster

Authors:
Add personal information
ACM Fellow badge
  Affiliation history
Bibliometrics: publication history
Average citations per article20.09
Citation Count2,591
Publication count129
Publication years2001-2017
Available for download107
Average downloads per article1,506.64
Downloads (cumulative)161,210
Downloads (12 Months)13,024
Downloads (6 Weeks)1,531
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


138 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 138
Result page: 1 2 3 4 5 6 7

Sort by:

1 published by ACM
August 2018 IoT S&P '18: Proceedings of the 2018 Workshop on IoT Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 54,   Downloads (12 Months): 54,   Downloads (Overall): 54

Full text available: PDFPDF
In this paper, we present two web-based attacks against local IoT devices that any malicious web page or third-party script can perform, even when the devices are behind NATs. In our attack scenario, a victim visits the attacker's website, which contains a malicious script that communicates with IoT devices on ...
Keywords: DNS rebinding, Internet of Things, JavaScript, privacy

2 published by ACM
August 2018 SIGCOMM '18: Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 173,   Downloads (12 Months): 173,   Downloads (Overall): 173

Full text available: PDFPDF
Managing and securing networks requires collecting and analyzing network traffic data in real time. Existing telemetry systems do not allow operators to express the range of queries needed to perform management or scale to large traffic volumes and rates. We present Sonata, an expressive and scalable telemetry system that coordinates ...
Keywords: analytics, programmable switches, stream processing

3 published by ACM
August 2018 IoT S&P '18: Proceedings of the 2018 Workshop on IoT Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 52,   Downloads (12 Months): 52,   Downloads (Overall): 52

Full text available: PDFPDF
The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy. Research has shown that network adversaries can use traffic rate metadata from consumer IoT devices to infer sensitive user activities. Shaping traffic flows to fit distributions independent of ...
Keywords: Internet of Things, Privacy, independent link padding, traffic shaping

4 published by ACM
August 2018 APNet '18: Proceedings of the 2nd Asia-Pacific Workshop on Networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 30,   Downloads (12 Months): 30,   Downloads (Overall): 30

Full text available: PDFPDF
Autonomous systems (ASes) on the Internet increasingly rely on Internet Exchange Points (IXPs) for peering. A single IXP may interconnect several 100s or 1000s of participants (ASes) all of which might peer with each other through BGP sessions. IXPs have addressed this scaling challenge through the use of route servers. ...
Keywords: BGP, IXP, Policy, Privacy

5 published by ACM
July 2018 ANRW '18: Proceedings of the Applied Networking Research Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 0

Full text available: PDFPDF
The proliferation of networked devices, systems, and applications that we depend on every day makes managing networks more important than ever. The increasing security, availability, and performance demands of these applications suggest that these increasingly difficult network management problems be solved in real time, across a complex web of interacting ...

6 published by ACM
July 2018 Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies: Volume 2 Issue 2, June 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 117,   Downloads (12 Months): 141,   Downloads (Overall): 141

Full text available: PDFPDF
The proliferation of Internet of Things (IoT) devices for consumer "smart" homes raises concerns about user privacy. We present a survey method based on the Contextual Integrity (CI) privacy framework that can quickly and efficiently discover privacy norms at scale. We apply the method to discover privacy norms in the ...
Keywords: Contextual Integrity, Internet of Things, Privacy

7 published by ACM
June 2018 COMPASS '18: Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 67,   Downloads (12 Months): 67,   Downloads (Overall): 67

Full text available: PDFPDF
While the growth of the Internet has fostered more efficient communications around the world, there is a large digital divide between Western countries and the rest of the world. Countries such as Brazil, China, and Saudi Arabia have questioned and criticized America's Internet hegemony. This paper studies the extent to ...

8 published by ACM
November 2017 IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 55,   Downloads (12 Months): 55,   Downloads (Overall): 55

Full text available: PDFPDF
This paper introduces a method to capture network traffic from medical IoT devices and automatically detect cleartext information that may reveal sensitive medical conditions and behaviors. The research follows a three-step approach involving traffic collection, cleartext detection, and metadata analysis. We analyze four popular consumer medical IoT devices, including one ...
Keywords: internet of things, medical devices, personal health information, privacy

9
August 2017 SEC'17: Proceedings of the 26th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

Despite the pervasive nature of Internet censorship and the continuous evolution of how and where censorship is applied, measurements of censorship remain comparatively sparse. Understanding the scope, scale, and evolution of Internet censorship requires global measurements, performed at regular intervals. Unfortunately, the state of the art relies on techniques that, ...

10
August 2017 Telecommunications Policy: Volume 41 Issue 7, August 2017
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 0

This paper performs an exploratory study of mobile usage patterns over three years (20132015) in the context of pricing practices such as zero-rating. In recent years, there has been heated ongoing debate regarding whether offering different pricing plans, such as zero-rated services and applications, might slant user behavior toward certain ...
Keywords: Zero-rating, Mobile pricing, Mobile usage

11 published by ACM
April 2017 SOSR '17: Proceedings of the Symposium on SDN Research
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 71,   Downloads (Overall): 71

Full text available: PDFPDF
Software-Defined Internet eXchange Points (SDXes) are recently gaining momentum, with several SDXes now running in production. The deployment of multiple SDXes on the Internet raises the question of whether the interactions between these SDXes will cause correctness problems, since SDX policies can deflect traffic away from the default BGP route ...
Keywords: Routing, Software Defined Networking (SDN), Internet Exchange Point (IXP)

12 published by ACM
April 2017 SOSR '17: Proceedings of the Symposium on SDN Research
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 16,   Downloads (12 Months): 208,   Downloads (Overall): 208

Full text available: PDFPDF
Network devices such as routers and switches forward traffic based on entries in their local forwarding tables. Although these forwarding tables conventionally make decisions based on a packet header field such as a destination address, tagging flows with sets or sequences of attributes and making forwarding decisions based on these ...
Keywords: Software-Defined Networks, Commodity Switch, Network Management, TCAM, OpenFlow

13 published by ACM
January 2017 ACM SIGCOMM Computer Communication Review: Volume 47 Issue 1, January 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 76,   Downloads (Overall): 76

Full text available: PDFPDF
This is a report on the Workshop on Tracking Quality of Experience in the Internet, held at Princeton, October 21--22, 2015, jointly sponsored by the National Science Foundation and the Federal Communication Commission. The term Quality of Experience (QoE) describes a user's subjective assessment of their experience when using a ...
Keywords: Internet, Quality of Experience, measurement techniques

14 published by ACM
November 2016 ACM DEV '16: Proceedings of the 7th Annual Symposium on Computing for Development
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 98,   Downloads (Overall): 98

Full text available: PDFPDF
This paper presents a study of mobile data usage in South African townships. In contrast to previous studies, which have studied mobile data usage in developing regions (including South Africa), we focus our study on two townships in South Africa; the extremely resource-constrained nature of townships sheds light, for the ...
Keywords: mobile application popularity, usage patterns, Smartphone usage

15 published by ACM
November 2016 HotNets '16: Proceedings of the 15th ACM Workshop on Hot Topics in Networks
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 36,   Downloads (12 Months): 377,   Downloads (Overall): 377

Full text available: PDFPDF
Programmable switches potentially make it easier to perform flexible network monitoring queries at line rate, and scalable stream processors make it possible to fuse data streams to answer more sophisticated queries about the network in real-time. However, processing such network monitoring queries at high traffic rates requires both the switches ...

16 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 9,   Downloads (12 Months): 171,   Downloads (Overall): 466

Full text available: PDFPDF
Miscreants register thousands of new domains every day to launch Internet-scale attacks, such as spam, phishing, and drive-by downloads. Quickly and accurately determining a domain's reputation (association with malicious activity) provides a powerful tool for mitigating threats and protecting users. Yet, existing domain reputation systems work by observing domain use ...
Keywords: domain registration, early detection, reputation system

17 published by ACM
August 2016 SIGCOMM '16: Proceedings of the 2016 ACM SIGCOMM Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 14,   Downloads (12 Months): 279,   Downloads (Overall): 279

Full text available: PDFPDF
An increasing number of countries are passing laws that facilitate the mass surveillance of their citizens. In response, governments and citizens are increasingly paying attention to the countries that their Internet traffic traverses. In some cases, countries are taking extreme steps, such as building new IXPs and encouraging local interconnection ...
Keywords: routing, surveillance

18 published by ACM
August 2016 SIGCOMM '16: Proceedings of the 2016 ACM SIGCOMM Conference
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 49,   Downloads (12 Months): 656,   Downloads (Overall): 2,105

Full text available: PDFPDF
Hypervisors use software switches to steer packets to and from virtual machines (VMs). These switches frequently need upgrading and customization—to support new protocol headers or encapsulations for tunneling and overlays, to improve measurement and debugging features, and even to add middlebox-like functions. Software switches are typically based on a large ...
Keywords: Domain-Specific Languages (DSL), OVS, P4, Programmable Data Planes, Software Switch, Software-Defined Networks (SDN), Compiler Optimizations, PISCES

19
August 2016 SEC'16: Proceedings of the 25th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools and methods to expose Sybil attacks. In this work, we develop sybilhunter , a system for detecting Sybil relays based on their appearance ...

20 published by ACM
May 2016 ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 7,   Downloads (12 Months): 62,   Downloads (Overall): 230

Full text available: PDFPDF
Modern websites use multiple authentication cookies to allow visitors to the site different levels of access. The complexity of modern web applications can make it difficult for a web application programmer to ensure that the use of authentication cookies does not introduce vulnerabilities. Even when a programmer has access to ...
Keywords: web application security, browser cookies



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us