2025
Edge Caching as Differentiation
2025. 39th Conference of the ACM Special Interest Group on Data Communication, Coimbra, Portugal, 2025-09-08 – 2025-09-11. p. 164 – 183. DOI : 10.1145/3718958.3754350.2024
Flow/Path Performance Consistency
2024. The 23rd ACM Workshop on Hot Topics in Networks, Irvine, CA, USA, 2024-11-18 – 2024-11-19. p. 255 – 263. DOI : 10.1145/3696348.3696887.Automatically Reasoning About How Systems Code Uses the CPU Cache
2024. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI’24), Santa Clara, CA, 2024-07-10 – 2024-07-12.Localizing Traffic Differentiation Practices on the Internet
Lausanne, EPFL, 2024.Improving Group Testing via Gradient Descent
IEEE Journal on Selected Areas in Information Theory. 2024. Vol. 5, p. 236 – 245. DOI : 10.1109/JSAIT.2024.3386182.Dynamic Group Testing to Control and Monitor Disease Progression in a Population
IEEE Journal on Selected Areas in Information Theory. 2024. Vol. 5, p. 609 – 622. DOI : 10.1109/JSAIT.2024.3466649.2023
Caching and Neutrality
2023. ACM Workshop on Hot Topics in Networks (HotNets), Cambridge, MA, USA, November 28-29, 2023. DOI : 10.1145/3626111.3628211.The Case for Performance Interfaces for Hardware Accelerators
2023. Workshop on Hot Topics in Operating Systems (HotOS), Providence, RI, USA, 2023-06-22. DOI : 10.1145/3593856.3595904.Learning a QoE Metric from Social Media and Gaming Footage
2023. 22nd ACM Workshop on Hot Topics in Networks, Cambridge, Massachusetts, USA, November 28-29, 2023. p. 117 – 123. DOI : 10.1145/3626111.3628208.Using Gaming Footage as a Source of Internet Latency Information
2023. 2023 Internet Measurement Conference, Montréal, Canada, October 24 – 26, 2023. p. 606 – 626. DOI : 10.1145/3618257.3624816.Localizing Traffic Differentiation
2023. ACM Internet Measurement Conference 2023, Montréal, Canada, October 24 – 26, 2023. p. 591 – 605. DOI : 10.1145/3618257.3624809.2022
Performance Interfaces for Network Functions
2022. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Renton, WA, USA, April 4-6, 2022. p. 567 – 584.Automated Verification of Network Function Binaries
2022. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Renton, WA, USA, April 4-6, 2022. p. 585 – 600.Dynamic Group Testing to Control and Monitor Disease Progression in a Population
2022. 2022 IEEE International Symposium on Information Theory (ISIT), Espoo, Finland, 2022-06-25 – 2022-07-01. p. 2255 – 2260. DOI : 10.1109/ISIT50566.2022.9834823.Toward Internet Performance Transparency
Lausanne, EPFL, 2022.Improving Group Testing Via Gradient Descent
2022. 2022 IEEE International Symposium on Information Theory (ISIT), Espoo, Finland, 2022-06-26 – 2022-07-01. p. 2243 – 2248. DOI : 10.1109/ISIT50566.2022.9834577.2021
When to Hedge in Interactive Services
2021. 18th USENIX Symposium on Networked Systems Design and Implementation, Virtual Conference, April 12-14, 2021. p. 373 – 388.Group testing for connected communities
2021. 24th International Conference on Artificial Intelligence and Statistics (AISTATS), ELECTR NETWORK, Apr 13-15, 2021.An entropy reduction approach to continual testing
2021. IEEE International Symposium on Information Theory (ISIT), ELECTR NETWORK, Jul 12-20, 2021. p. 611 – 616. DOI : 10.1109/ISIT45174.2021.9518188.2020
Verification of Software Network Functions with No Verification Expertise
Lausanne, EPFL, 2020.2019
Verifying Software Network Functions with No Verification Expertise
2019. The 27th ACM Symposium on Operating Systems Principles (SOSP), Ontario, Canada, October 27-30, 2019. p. 275 – 290. DOI : 10.1145/3341301.3359647.Destination buffer analysis for packets rejection obliteration in multi-channel networks
Journal of The Franklin Institute-Engineering and Applied Mathematics. 2019. Vol. 356, num. 15, p. 8803 – 8828. DOI : 10.1016/j.jfranklin.2019.07.025.MorphIT: Morphing Packet Reports for Internet Transparency
2019. Privacy Enhancing Technologies Symposium (PETS), Stockholm, Sweden, July 16–20, 2019. p. 88 – 104. DOI : 10.2478/popets-2019-0021.Performance Contracts for Software Network Functions
2019. ACM Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, USA, February 26-28, 2019. p. 517 – 530.Retroactive Packet Sampling for Traffic Receipts
2019. ACM SIGMETRICS Conference, Phoenix, Arizona, USA, June 24-28, 2019. DOI : 10.1145/3322205.3311090.Traffic Locality as an Opportunity in the Data Center
Lausanne, EPFL, 2019.2018
Automated Synthesis of Adversarial Workloads for Network Functions
2018. ACM SIGCOMM Conference, Budapest, Hungary, 2018-08-21. DOI : 10.1145/3230543.3230573.Network Neutrality Inference using Network Tomography
Lausanne, EPFL, 2018.Traffic Receipts for Network Transparency
Lausanne, EPFL, 2018.Adding flexibility to multi-tenant networks
Lausanne, EPFL, 2018.ResQ: Enabling SLOs in Network Function Virtualization
2018. USENIX Symposium on Networked Systems Design and Implementation, Renton, WA, Apr 09-11, 2018. p. 283 – 297.2017
Generating Steganographic Text with LSTMs
2017. ACL Student Research Workshop 2017, Vancouver, Canada, July 30-August 4, 2017. p. 100 – 106. DOI : 10.18653/v1/P17-3017.How to Measure the Killer Microsecond
2017. ACM SIGCOMM 2017 Workshop on Kernel-Bypass Networks (KBNets’17), Los Angeles, CA, USA, August 21, 2017. p. 37 – 42. DOI : 10.1145/3098583.3098590.A Formally Verified NAT
2017. ACM SIGCOMM Conference, Los Angeles, CA, USA, August 21-25, 2017. DOI : 10.1145/3098822.3098833.2016
Building Security Protocols Against Powerful Adversaries
Lausanne, EPFL, 2016.Matryoshka: Hiding Secret Communication in Plain Sight
2016. 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI), Austin, Texas, USA, August 8, 2016.VNToR: Network Virtualization at the Top-of-Rack Switch
2016. ACM Symposium on Cloud Computing. DOI : 10.1145/2987550.2987582.Creating Secrets Out Of Packet Erasures
IEEE Transactions on Information Forensics and Security. 2016. Vol. 11, num. 6, p. 1177 – 1191. DOI : 10.1109/TIFS.2016.2520887.2015
Software Dataplane Verification
Communications Of The Acm. 2015. Vol. 58, num. 11, p. 113 – 121. DOI : 10.1145/2823400.Towards Unconditional Tor-Like Anonymity
2015. The 2015 IEEE International Sumposium on Network Coding (NetCod) – Invited Paper, Sydney, Australia, June 22-24, 2015. p. 66 – 70. DOI : 10.1109/NETCOD.2015.7176791.Efficient Key Exchange for Wireless Multi-hop Networks
2015
Building Evolvable Networks : Flexible and Predictable Packet Processing
Lausanne, EPFL, 2015.Transparency Instead of Neutrality
2015. ACM Workshop on Hot Topics in Networks (HotNets), Philadelphia, Pennsylvania, USA, November 16-17. DOI : 10.1145/2834050.2834082.2014
Network Neutrality Inference
2014. ACM SIGCOMM Conference, Chicago, Illinois, USA, August 19-21, 2014. DOI : 10.1145/2619239.2626308.Software Dataplane Verification
2014. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, USA, April 2-4, 2014.Software Dataplane Verification
2014
Network Neutrality Inference
2014
2013
Exchanging Pairwise Secrets Efficiently
2013. The 32nd Annual IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April 14-19, 2013. p. 2265 – 2273. DOI : 10.1109/INFCOM.2013.6567030.Toward a Verifiable Software Dataplane
2013. ACM Workshop on Hot Topics in Networks, College Park, Maryland, USA, November 21-22, 2013. DOI : 10.1145/2535771.2535777.SenseCode: Network Coding for Reliable Sensor Networks
Acm Transactions On Sensor Networks. 2013. Vol. 9, num. 2, p. 25. DOI : 10.1145/2422966.2422982.Creating Secrets out of Erasures
2013. ACM Conference on Mobile Computing and Networking (MobiCom), Miami, Florida, USA, September 30 – October 4. p. 429 – 440. DOI : 10.1145/2500423.2500440.2012
Creating Shared Secrets out of Thin Air
2012. ACM Workshop on Hot Topics in Networks (HotNets), Redmond, WA, USA, October 29-30, 2012. p. 73 – 78. DOI : 10.1145/2390231.2390244.Optinal Source-Based Filtering of Malicious Traffic
IEEE ACM Transactions on Networking. 2012. Vol. 20, num. 2, p. 381 – 395. DOI : 10.1109/TNET.2011.2161615.Practical Network Tomography
Lausanne, EPFL, 2012.Toward Predictable Performance in Software Packet-Processing Platforms
2012. USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, USA, April 25-27, 2012.Toward Predictable Performance in Software Packet-Processing Platforms
2012
2011
Shifting Network Tomography Toward A Practical Goal
2011. ACM International Conference on emerging Networking EXperiments and Technologies (CoNext), Tokyo, Japan, December 6–9, 2011. DOI : 10.1145/2079296.2079320.2010
Netscope: Practical Network Loss Tomography
2010. IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, USA, March 15-19, 2010. DOI : 10.1109/INFCOM.2010.5461918.Verifiable Network-Performance Measurements
2010
Group Secret Key Generation over Broadcast Erasure Channels
2010. Asilomar Conference on Signals, Systems, and Computers, November 7-10, 2010. p. 719 – 723. DOI : 10.1109/ACSSC.2010.5757657.Network Tomography on Correlated Links
2010. ACM Internet Measurement Conference (IMC), Melbourne, Australia, November 1-3, 2010. p. 225 – 238. DOI : 10.1145/1879141.1879170.Joint Identity-Message Coding for Sensor Networks
IEEE Journal on Selected Areas in Communications. 2010. Vol. 28, num. 7, p. 1083 – 1093. DOI : 10.1109/JSAC.2010.100913.Controlling Parallelism on Multi-core Software Routers
2010. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Philadelphia, PA, USA, November 30, 2010. DOI : 10.1145/1921151.1921154.Verifiable Network-Performance Measurements
2010. ACM International Conference on emerging Networking EXperiments and Technologies (CoNext), Philadelphia, PA, USA, November 30 – December 3, 2010. DOI : 10.1145/1921168.1921170.Erased Secrets: Practical Information-Theoretic Group Secrecy
2010
Evaluating the Suitability of Server Network Cards for Software Routers
2010. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Philadelphia, PA, USA, November 30, 2010. DOI : 10.1145/1921151.1921161.2009
Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks
IEEE/ACM Transactions on Networking. 2009. Vol. 17, num. 4, p. 1284 – 1297. DOI : 10.1109/TNET.2008.2007431.SenseCode: Network Coding for Reliable Sensor Networks
2009
Optimal Filtering of Source Address Prefixes: Models and Algorithms
2009. IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25. DOI : 10.1109/INFCOM.2009.5062172.Compressed network coding vectors
2009. IEEE International Symposium on Information Theory (ISIT’09), Seoul, Korea, June 28-July 3, 2009. p. 109 – 113. DOI : 10.1109/ISIT.2009.5206041.RouteBricks: Exploiting Parallelism to Scale Software Routers
2009. ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, USA, October 11-14, 2009. p. 15 – 28. DOI : 10.1145/1629575.1629578.Identity Aware Sensor Networks
2009. IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25, 2009. DOI : 10.1109/INFCOM.2009.5062142.2008
Can Software Routers Scale?
2008. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Seattle, WA, USA, August 22, 2008. p. 21 – 26. DOI : 10.1145/1397718.1397724.Identity Aware Sensor Networks
2008