2023
The Case for Performance Interfaces for Hardware Accelerators
2023-06-22. Workshop on Hot Topics in Operating Systems (HotOS), Providence, RI, USA, 2023-06-22. DOI : 10.1145/3593856.3595904.Caching and Neutrality
2023-11-28. ACM Workshop on Hot Topics in Networks (HotNets), Cambridge, MA, USA, November 28-29, 2023. DOI : 10.1145/3626111.3628211.Learning a QoE Metric from Social Media and Gaming Footage
2023. 22nd ACM Workshop on Hot Topics in Networks, Cambridge, Massachusetts, USA, November 28-29, 2023. p. 117-123. DOI : 10.1145/3626111.3628208.Localizing Traffic Differentiation
2023. ACM Internet Measurement Conference 2023, Montréal, Canada, October 24 – 26, 2023. p. 591-605. DOI : 10.1145/3618257.3624809.Using Gaming Footage as a Source of Internet Latency Information
2023. 2023 Internet Measurement Conference, Montréal, Canada, October 24 – 26, 2023. p. 606-626. DOI : 10.1145/3618257.3624816.2022
Toward Internet Performance Transparency
Lausanne, EPFL, 2022.Automated Verification of Network Function Binaries
2022-04-04. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Renton, WA, USA, April 4-6, 2022. p. 585-600.Performance Interfaces for Network Functions
2022-04-04. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Renton, WA, USA, April 4-6, 2022. p. 567-584.2021
An entropy reduction approach to continual testing
2021-01-01. IEEE International Symposium on Information Theory (ISIT), ELECTR NETWORK, Jul 12-20, 2021. p. 611-616. DOI : 10.1109/ISIT45174.2021.9518188.Group testing for connected communities
2021-01-01. 24th International Conference on Artificial Intelligence and Statistics (AISTATS), ELECTR NETWORK, Apr 13-15, 2021.When to Hedge in Interactive Services
2021-02-16. 18th USENIX Symposium on Networked Systems Design and Implementation, Virtual Conference, April 12-14, 2021. p. 373-388.2020
Verification of Software Network Functions with No Verification Expertise
Lausanne, EPFL, 2020.2019
Verifying Software Network Functions with No Verification Expertise
2019-10-29. The 27th ACM Symposium on Operating Systems Principles (SOSP), Ontario, Canada, October 27-30, 2019. p. 275-290. DOI : 10.1145/3341301.3359647.Destination buffer analysis for packets rejection obliteration in multi-channel networks
Journal of The Franklin Institute-Engineering and Applied Mathematics. 2019-10-01. Vol. 356, num. 15, p. 8803-8828. DOI : 10.1016/j.jfranklin.2019.07.025.MorphIT: Morphing Packet Reports for Internet Transparency
2019-05-04. Privacy Enhancing Technologies Symposium (PETS), Stockholm, Sweden, July 16–20, 2019. p. 88-104. DOI : 10.2478/popets-2019-0021.Traffic Locality as an Opportunity in the Data Center
Lausanne, EPFL, 2019.Retroactive Packet Sampling for Traffic Receipts
2019. ACM SIGMETRICS Conference, Phoenix, Arizona, USA, June 24-28, 2019. p. 19. DOI : 10.1145/3322205.3311090.Performance Contracts for Software Network Functions
2019-02-26. ACM Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, USA, February 26-28, 2019. p. 517-530.2018
ResQ: Enabling SLOs in Network Function Virtualization
2018-01-01. USENIX Symposium on Networked Systems Design and Implementation, Renton, WA, Apr 09-11, 2018. p. 283-297.Automated Synthesis of Adversarial Workloads for Network Functions
2018-08-21. ACM SIGCOMM Conference, Budapest, Hungary, 21-08-2018. DOI : 10.1145/3230543.3230573.Traffic Receipts for Network Transparency
Lausanne, EPFL, 2018.Network Neutrality Inference using Network Tomography
Lausanne, EPFL, 2018.Adding flexibility to multi-tenant networks
Lausanne, EPFL, 2018.2017
A Formally Verified NAT
2017. ACM SIGCOMM Conference, Los Angeles, CA, USA, August 21-25, 2017. DOI : 10.1145/3098822.3098833.Generating Steganographic Text with LSTMs
2017. ACL Student Research Workshop 2017, Vancouver, Canada, July 30-August 4, 2017. p. 100-106. DOI : 10.18653/v1/P17-3017.How to Measure the Killer Microsecond
2017. ACM SIGCOMM 2017 Workshop on Kernel-Bypass Networks (KBNets’17), Los Angeles, CA, USA, August 21, 2017. p. 37-42. DOI : 10.1145/3098583.3098590.2016
Building Security Protocols Against Powerful Adversaries
Lausanne, EPFL, 2016.VNToR: Network Virtualization at the Top-of-Rack Switch
2016. ACM Symposium on Cloud Computing. DOI : 10.1145/2987550.2987582.Matryoshka: Hiding Secret Communication in Plain Sight
2016. 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI), Austin, Texas, USA, August 8, 2016.Creating Secrets Out Of Packet Erasures
IEEE Transactions on Information Forensics and Security. 2016. Vol. 11, num. 6, p. 1177-1191. DOI : 10.1109/TIFS.2016.2520887.2015
Transparency Instead of Neutrality
2015. ACM Workshop on Hot Topics in Networks (HotNets), Philadelphia, Pennsylvania, USA, November 16-17. DOI : 10.1145/2834050.2834082.Software Dataplane Verification
Communications Of The Acm. 2015. Vol. 58, num. 11, p. 113-121. DOI : 10.1145/2823400.Building Evolvable Networks
Lausanne, EPFL, 2015.Towards Unconditional Tor-Like Anonymity
2015. The 2015 IEEE International Sumposium on Network Coding (NetCod) – Invited Paper, Sydney, Australia, June 22-24, 2015. p. 66-70. DOI : 10.1109/NETCOD.2015.7176791.Efficient Key Exchange for Wireless Multi-hop Networks
2015
2014
Network Neutrality Inference
2014. ACM SIGCOMM Conference, Chicago, Illinois, USA, August 19-21, 2014. DOI : 10.1145/2619239.2626308.Software Dataplane Verification
2014. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, USA, April 2-4, 2014.Software Dataplane Verification
2014
Network Neutrality Inference
2014
2013
Toward a Verifiable Software Dataplane
2013. ACM Workshop on Hot Topics in Networks, College Park, Maryland, USA, November 21-22, 2013. p. 18. DOI : 10.1145/2535771.2535777.Creating Secrets out of Erasures
2013. ACM Conference on Mobile Computing and Networking (MobiCom), Miami, Florida, USA, September 30 – October 4. p. 429-440. DOI : 10.1145/2500423.2500440.Exchanging Pairwise Secrets Efficiently
2013. The 32nd Annual IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April 14-19, 2013. p. 2265-2273. DOI : 10.1109/INFCOM.2013.6567030.SenseCode: Network Coding for Reliable Sensor Networks
Acm Transactions On Sensor Networks. 2013. Vol. 9, num. 2, p. 25. DOI : 10.1145/2422966.2422982.2012
Creating Shared Secrets out of Thin Air
2012. ACM Workshop on Hot Topics in Networks (HotNets), Redmond, WA, USA, October 29-30, 2012. p. 73–78. DOI : 10.1145/2390231.2390244.Optinal Source-Based Filtering of Malicious Traffic
IEEE ACM Transactions on Networking. 2012. Vol. 20, num. 2, p. 381-395. DOI : 10.1109/TNET.2011.2161615.Toward Predictable Performance in Software Packet-Processing Platforms
2012. USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, USA, April 25-27, 2012.Toward Predictable Performance in Software Packet-Processing Platforms
2012
Practical Network Tomography
Lausanne, EPFL, 2012.2011
Shifting Network Tomography Toward A Practical Goal
2011. ACM International Conference on emerging Networking EXperiments and Technologies (CoNext), Tokyo, Japan, December 6–9, 2011. p. 24. DOI : 10.1145/2079296.2079320.2010
Joint Identity-Message Coding for Sensor Networks
IEEE Journal on Selected Areas in Communications. 2010. Vol. 28, num. 7, p. 1083-1093. DOI : 10.1109/JSAC.2010.100913.Evaluating the Suitability of Server Network Cards for Software Routers
2010. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Philadelphia, PA, USA, November 30, 2010. p. 7. DOI : 10.1145/1921151.1921161.Controlling Parallelism on Multi-core Software Routers
2010. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Philadelphia, PA, USA, November 30, 2010. p. 2. DOI : 10.1145/1921151.1921154.Group Secret Key Generation over Broadcast Erasure Channels
2010. Asilomar Conference on Signals, Systems, and Computers, November 7-10, 2010. p. 719-723. DOI : 10.1109/ACSSC.2010.5757657.Verifiable Network-Performance Measurements
2010
Verifiable Network-Performance Measurements
2010. ACM International Conference on emerging Networking EXperiments and Technologies (CoNext), Philadelphia, PA, USA, November 30 – December 3, 2010. p. 1. DOI : 10.1145/1921168.1921170.Erased Secrets: Practical Information-Theoretic Group Secrecy
2010
Network Tomography on Correlated Links
2010. ACM Internet Measurement Conference (IMC), Melbourne, Australia, November 1-3, 2010. p. 225–238. DOI : 10.1145/1879141.1879170.Netscope: Practical Network Loss Tomography
2010. IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, USA, March 15-19, 2010. DOI : 10.1109/INFCOM.2010.5461918.2009
Compressed network coding vectors
2009. IEEE International Symposium on Information Theory (ISIT’09), Seoul, Korea, June 28-July 3, 2009. p. 109-113. DOI : 10.1109/ISIT.2009.5206041.SenseCode: Network Coding for Reliable Sensor Networks
2009
RouteBricks: Exploiting Parallelism to Scale Software Routers
2009. ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, USA, October 11-14, 2009. p. 15–28. DOI : 10.1145/1629575.1629578.Optimal Filtering of Source Address Prefixes: Models and Algorithms
2009. IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25. DOI : 10.1109/INFCOM.2009.5062172.Identity Aware Sensor Networks
2009. IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25, 2009. DOI : 10.1109/INFCOM.2009.5062142.Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks
IEEE/ACM Transactions on Networking. 2009. Vol. 17, num. 4, p. 1284-1297. DOI : 10.1109/TNET.2008.2007431.2008
Can Software Routers Scale?
2008. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Seattle, WA, USA, August 22, 2008. p. 21–26. DOI : 10.1145/1397718.1397724.Identity Aware Sensor Networks
2008