2024
Automatically Reasoning About How Systems Code Uses the CPU Cache
2024. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI’24), Santa Clara, CA, 2024-07-10 – 2024-07-12.Localizing Traffic Differentiation Practices on the Internet
Lausanne, EPFL, 2024.Dynamic Group Testing to Control and Monitor Disease Progression in a Population
IEEE Journal on Selected Areas in Information Theory. 2024. Vol. 5, p. 609 – 622. DOI : 10.1109/JSAIT.2024.3466649.Improving Group Testing via Gradient Descent
IEEE Journal on Selected Areas in Information Theory. 2024. Vol. 5, p. 236 – 245. DOI : 10.1109/JSAIT.2024.3386182.2023
Caching and Neutrality
2023. ACM Workshop on Hot Topics in Networks (HotNets), Cambridge, MA, USA, November 28-29, 2023. DOI : 10.1145/3626111.3628211.The Case for Performance Interfaces for Hardware Accelerators
2023. Workshop on Hot Topics in Operating Systems (HotOS), Providence, RI, USA, 2023-06-22. DOI : 10.1145/3593856.3595904.Localizing Traffic Differentiation
2023. ACM Internet Measurement Conference 2023, Montréal, Canada, October 24 – 26, 2023. p. 591 – 605. DOI : 10.1145/3618257.3624809.Using Gaming Footage as a Source of Internet Latency Information
2023. 2023 Internet Measurement Conference, Montréal, Canada, October 24 – 26, 2023. p. 606 – 626. DOI : 10.1145/3618257.3624816.Learning a QoE Metric from Social Media and Gaming Footage
2023. 22nd ACM Workshop on Hot Topics in Networks, Cambridge, Massachusetts, USA, November 28-29, 2023. p. 117 – 123. DOI : 10.1145/3626111.3628208.2022
Automated Verification of Network Function Binaries
2022. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Renton, WA, USA, April 4-6, 2022. p. 585 – 600.Performance Interfaces for Network Functions
2022. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Renton, WA, USA, April 4-6, 2022. p. 567 – 584.Toward Internet Performance Transparency
Lausanne, EPFL, 2022.2021
When to Hedge in Interactive Services
2021. 18th USENIX Symposium on Networked Systems Design and Implementation, Virtual Conference, April 12-14, 2021. p. 373 – 388.An entropy reduction approach to continual testing
2021. IEEE International Symposium on Information Theory (ISIT), ELECTR NETWORK, Jul 12-20, 2021. p. 611 – 616. DOI : 10.1109/ISIT45174.2021.9518188.Group testing for connected communities
2021. 24th International Conference on Artificial Intelligence and Statistics (AISTATS), ELECTR NETWORK, Apr 13-15, 2021.2020
Verification of Software Network Functions with No Verification Expertise
Lausanne, EPFL, 2020.2019
Verifying Software Network Functions with No Verification Expertise
2019. The 27th ACM Symposium on Operating Systems Principles (SOSP), Ontario, Canada, October 27-30, 2019. p. 275 – 290. DOI : 10.1145/3341301.3359647.Destination buffer analysis for packets rejection obliteration in multi-channel networks
Journal of The Franklin Institute-Engineering and Applied Mathematics. 2019. Vol. 356, num. 15, p. 8803 – 8828. DOI : 10.1016/j.jfranklin.2019.07.025.MorphIT: Morphing Packet Reports for Internet Transparency
2019. Privacy Enhancing Technologies Symposium (PETS), Stockholm, Sweden, July 16–20, 2019. p. 88 – 104. DOI : 10.2478/popets-2019-0021.Performance Contracts for Software Network Functions
2019. ACM Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, USA, February 26-28, 2019. p. 517 – 530.Retroactive Packet Sampling for Traffic Receipts
2019. ACM SIGMETRICS Conference, Phoenix, Arizona, USA, June 24-28, 2019. DOI : 10.1145/3322205.3311090.Traffic Locality as an Opportunity in the Data Center
Lausanne, EPFL, 2019.2018
Automated Synthesis of Adversarial Workloads for Network Functions
2018. ACM SIGCOMM Conference, Budapest, Hungary, 2018-08-21. DOI : 10.1145/3230543.3230573.Adding flexibility to multi-tenant networks
Lausanne, EPFL, 2018.Network Neutrality Inference using Network Tomography
Lausanne, EPFL, 2018.Traffic Receipts for Network Transparency
Lausanne, EPFL, 2018.ResQ: Enabling SLOs in Network Function Virtualization
2018. USENIX Symposium on Networked Systems Design and Implementation, Renton, WA, Apr 09-11, 2018. p. 283 – 297.2017
How to Measure the Killer Microsecond
2017. ACM SIGCOMM 2017 Workshop on Kernel-Bypass Networks (KBNets’17), Los Angeles, CA, USA, August 21, 2017. p. 37 – 42. DOI : 10.1145/3098583.3098590.A Formally Verified NAT
2017. ACM SIGCOMM Conference, Los Angeles, CA, USA, August 21-25, 2017. DOI : 10.1145/3098822.3098833.Generating Steganographic Text with LSTMs
2017. ACL Student Research Workshop 2017, Vancouver, Canada, July 30-August 4, 2017. p. 100 – 106. DOI : 10.18653/v1/P17-3017.2016
Creating Secrets Out Of Packet Erasures
IEEE Transactions on Information Forensics and Security. 2016. Vol. 11, num. 6, p. 1177 – 1191. DOI : 10.1109/TIFS.2016.2520887.Building Security Protocols Against Powerful Adversaries
Lausanne, EPFL, 2016.VNToR: Network Virtualization at the Top-of-Rack Switch
2016. ACM Symposium on Cloud Computing. DOI : 10.1145/2987550.2987582.Matryoshka: Hiding Secret Communication in Plain Sight
2016. 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI), Austin, Texas, USA, August 8, 2016.2015
Towards Unconditional Tor-Like Anonymity
2015. The 2015 IEEE International Sumposium on Network Coding (NetCod) – Invited Paper, Sydney, Australia, June 22-24, 2015. p. 66 – 70. DOI : 10.1109/NETCOD.2015.7176791.Efficient Key Exchange for Wireless Multi-hop Networks
2015
Transparency Instead of Neutrality
2015. ACM Workshop on Hot Topics in Networks (HotNets), Philadelphia, Pennsylvania, USA, November 16-17. DOI : 10.1145/2834050.2834082.Software Dataplane Verification
Communications Of The Acm. 2015. Vol. 58, num. 11, p. 113 – 121. DOI : 10.1145/2823400.Building Evolvable Networks : Flexible and Predictable Packet Processing
Lausanne, EPFL, 2015.2014
Network Neutrality Inference
2014
Software Dataplane Verification
2014. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, USA, April 2-4, 2014.Software Dataplane Verification
2014
Network Neutrality Inference
2014. ACM SIGCOMM Conference, Chicago, Illinois, USA, August 19-21, 2014. DOI : 10.1145/2619239.2626308.2013
Exchanging Pairwise Secrets Efficiently
2013. The 32nd Annual IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April 14-19, 2013. p. 2265 – 2273. DOI : 10.1109/INFCOM.2013.6567030.Creating Secrets out of Erasures
2013. ACM Conference on Mobile Computing and Networking (MobiCom), Miami, Florida, USA, September 30 – October 4. p. 429 – 440. DOI : 10.1145/2500423.2500440.SenseCode: Network Coding for Reliable Sensor Networks
Acm Transactions On Sensor Networks. 2013. Vol. 9, num. 2, p. 25. DOI : 10.1145/2422966.2422982.Toward a Verifiable Software Dataplane
2013. ACM Workshop on Hot Topics in Networks, College Park, Maryland, USA, November 21-22, 2013. DOI : 10.1145/2535771.2535777.2012
Toward Predictable Performance in Software Packet-Processing Platforms
2012
Toward Predictable Performance in Software Packet-Processing Platforms
2012. USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, USA, April 25-27, 2012.Optinal Source-Based Filtering of Malicious Traffic
IEEE ACM Transactions on Networking. 2012. Vol. 20, num. 2, p. 381 – 395. DOI : 10.1109/TNET.2011.2161615.Practical Network Tomography
Lausanne, EPFL, 2012.Creating Shared Secrets out of Thin Air
2012. ACM Workshop on Hot Topics in Networks (HotNets), Redmond, WA, USA, October 29-30, 2012. p. 73 – 78. DOI : 10.1145/2390231.2390244.2011
Shifting Network Tomography Toward A Practical Goal
2011. ACM International Conference on emerging Networking EXperiments and Technologies (CoNext), Tokyo, Japan, December 6–9, 2011. DOI : 10.1145/2079296.2079320.2010
Verifiable Network-Performance Measurements
2010
Erased Secrets: Practical Information-Theoretic Group Secrecy
2010
Group Secret Key Generation over Broadcast Erasure Channels
2010. Asilomar Conference on Signals, Systems, and Computers, November 7-10, 2010. p. 719 – 723. DOI : 10.1109/ACSSC.2010.5757657.Joint Identity-Message Coding for Sensor Networks
IEEE Journal on Selected Areas in Communications. 2010. Vol. 28, num. 7, p. 1083 – 1093. DOI : 10.1109/JSAC.2010.100913.Controlling Parallelism on Multi-core Software Routers
2010. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Philadelphia, PA, USA, November 30, 2010. DOI : 10.1145/1921151.1921154.Verifiable Network-Performance Measurements
2010. ACM International Conference on emerging Networking EXperiments and Technologies (CoNext), Philadelphia, PA, USA, November 30 – December 3, 2010. DOI : 10.1145/1921168.1921170.Evaluating the Suitability of Server Network Cards for Software Routers
2010. ACM SIGCOMM Workshop on Programmable Routers for Extensible Services of TOmorrow (PRESTO), Philadelphia, PA, USA, November 30, 2010. DOI : 10.1145/1921151.1921161.Netscope: Practical Network Loss Tomography
2010. IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, USA, March 15-19, 2010. DOI : 10.1109/INFCOM.2010.5461918.Network Tomography on Correlated Links
2010. ACM Internet Measurement Conference (IMC), Melbourne, Australia, November 1-3, 2010. p. 225 – 238. DOI : 10.1145/1879141.1879170.2009
Optimal Filtering of Source Address Prefixes: Models and Algorithms
2009. IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25. DOI : 10.1109/INFCOM.2009.5062172.SenseCode: Network Coding for Reliable Sensor Networks
2009
RouteBricks: Exploiting Parallelism to Scale Software Routers
2009. ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, USA, October 11-14, 2009. p. 15 – 28. DOI : 10.1145/1629575.1629578.Identity Aware Sensor Networks
2009. IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25, 2009. DOI : 10.1109/INFCOM.2009.5062142.Compressed network coding vectors
2009. IEEE International Symposium on Information Theory (ISIT’09), Seoul, Korea, June 28-July 3, 2009. p. 109 – 113. DOI : 10.1109/ISIT.2009.5206041.Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks
IEEE/ACM Transactions on Networking. 2009. Vol. 17, num. 4, p. 1284 – 1297. DOI : 10.1109/TNET.2008.2007431.2008
Identity Aware Sensor Networks
2008