Select Publications


Simulation as Experiment: An Empirical Critique of Simulation Research on Recommender Systems,
Amy A. Winecoff, Sun, M., Lucherini, E., & Narayanan, A.
arXiv preprint arXiv:2107.08959, August 2021,
Beyond Algorithmic Bias: A Socio-Computational Interrogation of the Google Search by Image Algorithm, PDF
Orestis Papakyriakopoulos, Arwa Michelle Mboya
July 2021,
The Media During the Rise of Trump: Identity Politics, Immigration,”Mexican” Demonization and Hate-Crime, PDF
Orestis Papakyriakopoulos, Ethan Zuckerman
ICWSM 2021, July 2021,
Political machines: a framework for studying politics in social machines, PDF
Orestis Papakyriakopoulos
AI & SOCIETY 2021, July 2021,
T-RECS: A Simulation Tool to Study the Societal Impact of Recommender Systems, PDF
Eli Lucherini, Matthew Sun, Amy Winecoff, and Arvind Narayanan
arXiv preprint 2021, July 2021,
This Seems to Work: Designing Technological Systems with The Algorithmic Imaginations of Those Who Labor, PDF
Lindsey Cameron, Angele Christin, Michael Ann DeVito, Tiwanna Dillahunt, Madeleine Elish, Mary Gray, Noopur Raval, Rida Qadri, Melissa Valentine, and Elizabeth Anne Watkins
CHI Workshops 2021, July 2021,
The Tension Between Information Justice and Security: Perceptions of Facial Recognition Targeting, PDF
Elizabeth Anne Watkins
Joint Proceedings of the ACM IUI Workshops 2021, July 2021,
Algorithmic impact assessments and accountability: The co-construction of impacts, PDF
Jacob Metcalf, Emanuel Moss, Elizabeth Anne Watkins, Ranjit Singh, Madeleine Clare Elish
FAccT 2021, July 2021,
Governing Algorithmic Systems with Impact Assessments: Six Observations, PDF
Elizabeth Anne Watkins, Emanuel Moss, Jacob Metcalf, Ranjit Singh, Madeleine Clare Elish
AIES 2021, July 2021,


Endorsement Guides, P204500, PDF
Marshini Chetty, Mihir Kshirsagar, Arunesh Mathur, Jonathan Mayer, Arvind Narayanan
June 2020,
Comments on Revised Proposed Regulations Implementing the California Consumer Privacy Act, PDF
Marshini Chetty, Shaanan Cohney, Mihir Kshirsagar, Arunesh Mathur, Jonathan Mayer, Arvind Narayanan, Ross Teixeira, Ari Ezra Waldman
February 2020,
An Empirical Study of Wireless Carrier Authentication for SIM Swaps, PDF
Kevin Lee, Ben Kaiser, Jonathan Mayer, Arvind Narayanan
January 2020,


COPPA Rule Review, 16 CFR part 312, Project No. P195404, PDF
Marshini Chetty, Edward W. Felten, Mihir Kshirsagar, Arunesh Mathur, Jonathan Mayer, Arvind Narayanan, Victor Ongkowijaya, Matthew J. Salganik, Madelyn Sanfilippo, Ari Ezra Waldman
December 2019,
Enhancing the Security of Data Breach Notifications and Settlement Notices, PDF
Ryan B. Amos, Mihir Kshirsagar, Edward W. Felten, Arvind Narayanan
November 2019,
Effective Cryptocurrency Regulation Through Blacklisting, PDF
Malte Möser, Arvind Narayanan
October 2019,
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale, PDF
Danny Yuxing Huang, Noah Apthorpe, Gunes Acar, Frank Li, Nick Feamster
September 2019,
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices, PDF
Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan
September 2019, Proceedings of the 2019 ACM Conference on Computer and Communications security
Keepers of the Machines: Examining How System Administrators Manage Software Updates, PDF
USENIX Association, August 2019, Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security
Safeguards Rule, 16 CFR part 314, Project No. P145407, PDF
Ryan B. Amos, Tithi Chattopadhyay, Edward W. Felten, Mihir Kshirsagar, Jonathan Mayer, Arvind Narayanan
August 2019,
How DNS over HTTPS is Reshaping Privacy, Performance, and Policy in the Internet Ecosystem, PDF
Kevin Borgolte, Tithi Chattopadhyay, Nick Feamster, Mihir Kshirsagar, Jordan Holland, Austin Hounsel, Paul Schmit
July 2019, 47th Research Conference on Communications, Information and Internet Policy (TPRC)
Disaster Privacy/Privacy Disaster, PDF
Madelyn Sanfilippo, Yan Shvartzshnaider, Irwin Reyes, Helen Nissenbaum, Serge Egelman
July 2019,
Analyzing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web, PDF
Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster
July 2019,
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites, PDF
Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, Arvind Narayanan
July 2019,
Formal Barriers to Longest-Chain Proof-of-Stake Protocols, PDF
Jonah Brown-Cohen, Arvind Narayanan, Alexandros Psomas, S Matthew Weinberg
ACM, June 2019, Page 459, Proceedings of the 2019 ACM Conference on Economics and Computation
Robust de-anonymization of large sparse datasets: a decade later, PDF
Arvind Narayanan, Vitaly Shmatikov
May 2019,
Preventing harassment and increasing group participation through social norms in 2,190 online science discussions, PDF
J. Nathan Matias
Proceedings of the National Academy of Sciences, May 2019,
A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification, PDF
Sébastien Philippe, Alexander Glaser, Edward W Felten
Science & Global Security, Routledge, April 2019,
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union), PDF
Rob van Eijk, Hadi Asghari, Philipp Winter, Arvind Narayanan
Workshop on Technology and Consumer Protection (ConPro'19), March 2019,
AI Ethics: Seven Traps, PDF
Annette Zimmermann, Ben Zevenbergen
March 2019,
Successes and struggles with computational reproducibility: Lessons from the Fragile Families Challenge, PDF
David M. Liua, Matthew J. Salganik
SocArXiv, March 2019,
To Mitigate Insecure IoT Devices, Regulate Manufacturers or Consumers?, PDF
Matheus Ferreira, Tithi Chattopadhyay, Nick Feamster, Matt Weinberg, Danny Yuxing Huang
March 2019,
Selling a Single Item with Negative Externalities, PDF
Tithi Chattopadhyay, Nick Feamster, Matheus V. X. Ferreira, Danny Yuxing Huang, S. Matthew Weinberg 
February 2019,
Privacy Law’s False Promise, PDF
Ari Ezra Waldman
Washington University Law Review, February 2019,
Lightweight, General Inference of Streaming Video Quality from Encrypted Traffic, PDF
Francesco Bronzino, Paul Schmitt, Sara Ayoubi, Nick Feamster, Renata Teixeira, Sarah Wasserman, Srikanth Sundaresan
January 2019,
Privacy and Security Considerations For Digital Technology Use in Elementary Schools, PDF
Priya C Kumar, Marshini Chetty, Tamara L Clegg, Jessica Vitak
January 2019,
Identification of anonymous DNA using genealogical triangulation, PDF
Paul M Ellenbogen, Arvind Narayanan
bioRxiv, Cold Spring Harbor Laboratory, January 2019,


Estimating Profitability of Alternative Cryptocurrencies, PDF
Danny Yuxing Huan, Kirill Levchenko, Alex C. Snoeren
December 2018,
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping, PDF
Noah Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, and Nick Feamster
December 2018,
AirPress: High-accuracy spectrum summarization using compressed scans, PDF
Mariya Zheleva, Timothy Larock, Paul Schmitt, Petko Bogdanov
October 2018, 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)
User Perceptions of Smart Home IoT Privacy, PDF
Serena Zheng, Noah Apthorpe, Marshini Chetty, Nick Feamster
Proceedings of the ACM on Human-Computer Interaction, ACM, October 2018, Page 200,
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies, PDF
Steven Goldfeder, Harry Kalodner, Dillon Reisman, Arvind Narayanan
Proceedings on Privacy Enhancing Technologies, Sciendo, October 2018,
Formal Barriers to Longest-Chain Proof-of-Stake Protocols, PDF
Jonah Brown-Cohen, Arvind Narayanan, Christos-Alexandros Psomas, S. Matthew Weinberg
September 2018,
Analyzing Privacy Policies Using Contextual Integrity Annotations, PDF
Yan Shvartzshnaider, Noah Apthorpe, Nick Feamster, Helen Nissenbaum
September 2018,
A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation, PDF
Trisha Datta, Noah Apthorpe, Nick Feamster
ACM, August 2018,
Security and Privacy Analyses of Internet of Things Children’s Toys, PDF
Gordon Chu, Noah Apthorpe, Nick Feamster
IEEE Internet of Things Journal, IEEE, August 2018,
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking, PDF
Arunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty
August 2018, Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018)
Web-based Attacks to Discover and Control Local IoT Devices, PDF
Gunes Acar, Danny Yuxing Huang, Frank Li, Arvind Narayanan, Nick Feamster
August 2018,
Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic, PDF
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster
August 2018,
Determining an optimal threshold on the online reserves of a bitcoin exchange, PDF
Samvit Jain*, Edward Felten and Steven Goldfeder
Journal of Cybersecurity, August 2018,
Preserving Privacy at IXPs, PDF
Xiaohe Hu, Arpit Gupta, Nick Feamster, Aurojit Panda, Scott Shenker
ACM, August 2018,
Automatically Generating a Large, Culture-Specific Blocklist for China, PDF
Austin Hounsel, Prateek Mittal, Nick Feamster
July 2018,
Low on air: inherent wireless channel capacity limitations, PDF
Paul Schmitt, Elizabeth Belding
ACM, June 2018, Proceedings of the 2017 Workshop on Computing Within Limits
Nation-State Hegemony in Internet Routing, PDF
Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford
ACM, June 2018, Page 17, Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies
Co-designing online privacy-related games and stories with children, PDF
Priya Kumar, Jessica Vitak, Marshini Chetty, Tamara L Clegg, Jonathan Yang, Brenna McNally, Elizabeth Bonsignore
ACM, June 2018, Proceedings of the 17th ACM Conference on Interaction Design and Children
Oblivious DNS: Practical Privacy for DNS Queries, PDF
Paul Schmitt, Anne Edmundson, Nick Feamster
June 2018,
Tracking Ransomware End-to-end, PDF
Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C Snoeren, Damon McCoy
IEEE, May 2018, 2018 IEEE Symposium on Security and Privacy (SP)
Discovering smart home internet of things privacy norms using contextual integrity, PDF
Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, Nick Feamster
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, ACM, May 2018, Page 59,
Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices, PDF
Daniel Hahn, Noah Apthorpe, Nick Feamster
May 2018,
Machine Learning DDoS Detection for Consumer Internet of Things Devices, PDF
Rohan Doshi, Noah Apthorpe, Nick Feamster
IEEE, May 2018, 2018 IEEE Security and Privacy Workshops (SPW)
An Empirical Analysis of Traceability in the Monero Blockchain, PDF
Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, and Nicolas Christin
April 2018,
Understanding the Use and Impact of the Zero-Rated Free Basics Platform in South Africa, PDF
Julianne Romanosky, Marshini Chetty
ACM, April 2018, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
A Cellular Network Radio Access Performance Measurement System: Results from a Ugandan Refugee Settlements Field Trial, PDF
Carleen Maitland, Rich Caneba, Paul Schmitt, Thomas Koutsky
March 2018,
Enhancing Transparency: Internet Video Quality Inference from Network Traffic, PDF
Paul Schmitt, Francesco Bronzino, Renata Teixeira, Tithi Chattopadhyay, Nick Feamster
March 2018,
A Method to Link Advances in Artificial Intelligence to Occupational Abilities, PDF
Edward W. Felten, Manav Raj, Robert Seamans
AEA Papers and Proceedings, AEA, February 2018,
Association of Internet Researchers (AoIR) Roundtable Summary: Artificial Intelligence and the Good Society Workshop Proceedings, PDF
Corinne Cath, Michael Zimmer, Stine Lomborg, Ben Zevenbergen
February 2018,
Government Hacking, PDF
Jonathan Mayer
Yale Law Journal, January 2018,


Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin, PDF
Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan
Financial Cryptography and Data Security, December 2017,
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries, PDF
Aylin Caliskan-Islam, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan
December 2017,
Rangzen: Anonymously Getting the Word Out in a Blackout, PDF
Adam Lerner, Giulia Fanti, Yahel Ben-David, Jesus Garcia, Paul Schmitt, Barath Raghavan
December 2017,
‘No Telling Passcodes Out Because They’re Private’: Understanding Children’s Mental Models of Privacy and Security Online, PDF
Priya Kumar, Shalmali Milind Naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L Clegg, Jessica Vitak
Proceedings of the ACM on Human-Computer Interaction, ACM, December 2017,
A First Look at Mobile Internet Use in Township Communities in South Africa, PDF
Amreesh Phokeer, Melissa Densmore, David Johnson, Nick Feamster
ACM, November 2017, Proceedings of the 7th Annual Symposium on Computing for Development
Cleartext Data Transmissions in Consumer IoT Medical Devices, PDF
Daniel Wood, Noah Apthorpe, Nick Feamster
ACM, November 2017, Proceedings of the 2017 Workshop on Internet of Things Security and Privacy
I never signed up for this! Privacy implications of email tracking, PDF
Steven Englehardt, Jeffrey Han, Arvind Narayanan
September 2017, Proceedings of the Privacy Enhancing Technologies Symposium
Characterizing and Improving the Reliability of Broadband Internet Access, PDF
Zachary S Bischof, Fabian E Bustamante, Nick Feamster
September 2017,
Insight Into Africa’s Country-level Latencies, PDF
Josiah Chavula, Amreesh Phokeer, Agustin Formoso, Nick Feamster
IEEE, September 2017, 2017 IEEE AFRICON
BlockSci: Design and applications of a blockchain analysis platform, PDF
Harry Kalodner, Steven Goldfeder, Alishah Chator, Malte Möser, Arvind Narayanan
September 2017,
Bitcoin’s Academic Pedigree, PDF
Arvind Narayanan, Jeremy Clark
August 2017,
Global Measurement of DNS Manipulation, PDF
Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
August 2017, 26th USENIX Security Symposium (USENIX Security 17), USENIX Association
Backpage and Bitcoin: Uncovering Human Traffickers, PDF
Rebecca S Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, Damon McCoy
ACM, August 2017, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
Impact of user characteristics on attitudes towards automatic mobile application updates, PDF
Arunesh Mathur, Marshini Chetty
July 2017, Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017
Network Measurement and Systems for Resource-Constrained Environments, PDF
Paul Schmitt
July 2017,
The Future of Ad Blocking: An Analytical Framework and New Techniques, PDF
Grant Storey, Dillon Reisman, Jonathan Mayer, Arvind Narayanan
May 2017,
Poster: A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic, PDF
Noah Apthorpe, Dillon Reisman, Nick Feamster
May 2017,
Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers, PDF
Noah Apthorpe, Dillon Reisman, Nick Feamster
May 2017,
“Spiders in the Sky”: User Perceptions of Drones, Privacy, and Security, PDF
Victoria Chang, Pramod Chundury, Marshini Chetty
ACM, May 2017, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
The Princeton Web Transparency and Accountability Project, PDF
Arvind Narayanan, Dillon Reisman
Springer, May 2017,
Online Privacy and Web Transparency, PDF
Nataliia Bielova, Nikolaos Laoutaris, Arvind Narayanan, Nick Nikiforakis
April 2017, Dagstuhl Reports
Semantics derived automatically from language corpora necessarily contain human biases, PDF
Aylin Caliskan, Joanna J. Bryson, and Arvind Narayanan
Science, April 2017,
What’s in a Question: Using Visual Questions as a Form of Supervision, PDF
Siddha Ganju, Olga Russakovsky, Abhinav Gupta
CVPR, April 2017,
Obfuscation in Bitcoin: Techniques and Politics, PDF
Arvind Narayanan, Malte Möser
April 2017, International Workshop on Obfuscation: Science, Technology, and Theory
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks, PDF
Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal
IEEE, April 2017, 2017 IEEE Symposium on Security and Privacy (SP)
Pinning Down Abuse on Google Maps, PDF
Danny Yuxing Huang, Doug Grundman, Kurt Thomas, Abhishek Kumar, Elie Bursztein, Kirill Levchenko, Alex C Snoeren
International World Wide Web Conferences Steering Committee, April 2017, Proceedings of the 26th International Conference on World Wide Web
De-anonymizing Web Browsing Data with Social Networks, PDF
Jessica Su, Ansh Shukla, Sharad Goel, Arvind Narayanan
World Wide Web Conference, April 2017,
SDX-Based Flexibility or Internet Correctness?: Pick Two!, PDF
Rüdiger Birkner, Arpit Gupta, Nick Feamster, Laurent Vanbever
ACM, April 2017, Proceedings of the Symposium on SDN Research
Battery Status Not Included: Assessing Privacy in Web Standards, PDF
Lukasz Olejnik, Steven Englehardt, Arvind Narayanan
March 2017,
Using Crypto-currencies to Measure Financial Activities and Uncover Potential Identities of Actors Involved, PDF
Danny Yuxing Huang
March 2017,
Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning, PDF
Arvind Narayanan, Andrew Miller, Song Han
January 2017,
Mitigating the Increasing Risks of an Insecure Internet of Things, PDF
Nick Feamster
Colo. Tech. LJ, January 2017,
Workshop on Tracking Quality of Experience in the Internet: Summary and Outcomes, PDF
Fabián E Bustamante, David Clark, Nick Feamster
ACM SIGCOMM Computer Communication Review, ACM, January 2017,


Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts, PDF
Arvind Narayanan, Andrew Miller
December 2016,
Helping the Lone Operator in the Vast Frontier, PDF
Thomas Pötsch, Paul Schmitt, Jay Chen, Barath Raghavan
ACM, November 2016, Proceedings of the 15th ACM Workshop on Hot Topics in Networks
The Narrow Interpretation of the Computer Fraud and Abuse Act: A User Guide for Applying United States v. Nosal, PDF
Jonathan Mayer
George Washington Law Review, November 2016,
Network Monitoring as a Streaming Analytics Problem, PDF
Arpit Gupta, Rüdiger Birkner, Marco Canini, Nick Feamster, Chris Mac-Stoker, Walter Willinger
November 2016,
Crowdsourcing in Computer Vision, PDF
Adriana Kovashka, Olga Russakovsky, Li Fei-Fei, Kristen Grauman
November 2016,
Online tracking: A 1-million-site measurement and analysis, PDF
Steven Englehardt, Arvind Narayanan
October 2016, ACM Conference on Computer and Communications Security
On the Instability of Bitcoin Without the Block Reward, PDF
Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, Arvind Narayanan
October 2016, ACM Conference on Computer and Communications Security
On the Instability of Bitcoin Without the Block Reward, PDF
Miles Carlsten, Harry Kalodner, Matthew Weinberg, Arvind Narayanan
October 2016,
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration, PDF
Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster
October 2016,
Much Ado About Time: Exhaustive Annotation of Temporal Data, PDF
Gunnar A Sigurdsson, Olga Russakovsky, Ali Farhadi, Ivan Laptev, Abhinav Gupta
HCOMP, October 2016,
The Effect of DNS on Tor’s Anonymity, PDF
Benjamin Greschbach, Tobias Pulls, Laura M Roberts, Philipp Winter, Nick Feamster
September 2016,
Privacy, ethics, and data access: A case study of the Fragile Families Challenge, PDF
Ian Lundberg, Arvind Narayanan, Karen Levy, Matthew J Salganik
Socius, September 2016,
A First Look into Transnational Routing Detours, PDF
Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford
ACM, August 2016, Proceedings of the 2016 ACM SIGCOMM Conference
Identifying and Characterizing Sybils in the Tor Network, PDF
Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster
August 2016, 25th {USENIX} Security Symposium ({USENIX} Security 16)
PhoneHome: Robust Extension of Cellular Coverage, PDF
Paul Schmitt, Daniel Iland, Elizabeth Belding, Mariya Zheleva
August 2016, ICCCN 2016
SmartCell: Small-Scale Mobile Congestion Awareness, PDF
Paul Schmitt, Daniel Iland, Elizabeth Belding
IEEE Communications Magazine, July 2016,
Modular Verification for Computer Security, PDF
Andrew W. Appel
IEEE, June 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF)
“They Keep Coming Back Like Zombies”: Improving Software Updating Interfaces, PDF
Arunesh Mathur, Josefine Engel, Sonam Sobti, Victoria Chang, Marshini Chetty
June 2016, Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016
Navigating connectivity in reduced infrastructure environments, PDF
Paul Schmitt, Elizabeth Belding
ACM, June 2016, Proceedings of the Second Workshop on Computing within Limits
Treating Software-Defined Networks Like Disk Arrays, PDF
Zhiyuan Teo, Ken Birman, Noah Apthorpe, Robbert Van Renesse, Vasily Kuksenkov
IEEE, June 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft)
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security, PDF
Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
June 2016,
Community-level access divides: A refugee camp case study, PDF
Paul Schmitt, Daniel Iland, Elizabeth Belding, Brian Tomaszewski, Ying Xu, Carleen Maitland
ACM, June 2016, Proceedings of the Eighth International Conference on Information and Communication Technologies and Development
Half-Baked Cookies: Client Authentication on the Modern Web, PDF
Yogesh Mundada, Nick Feamster, Balachander Krishnamurthy, Saikat Guha, Dave Levin
May 2016,
Staggercast: Demand-Side Management for ISPs, PDF
Gareth Tyson, Nishanth Sastry, Richard Mortier, Nick Feamster
May 2016,
Characterizing and Avoiding Routing Detours Through Surveillance States, PDF
Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford
May 2016,
Evaluating the privacy properties of telephone metadata, PDF
Proceedings of the National Academy of Sciences, National Academy of Sciences, May 2016,
AirVIEW: Unsupervised transmitter detection for next generation spectrum sensing, PDF
Mariya Zheleva, Petko Bogdanov, Timothy Larock, Paul Schmitt
IEEE, April 2016, IEEE INFOCOM 2018-IEEE Conference on Computer Communications
HybridCell: Cellular connectivity on the fringes with demand-driven local cells, PDF
Paul Schmitt, Daniel Iland, Mariya Zheleva, Elizabeth Belding
April 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications
A Study of MVNO Data Paths and Performance, PDF
Paul Schmitt, Morgan Vigil, Elizabeth Belding
Springer, Cham, March 2016, International Conference on Passive and Active Network Measurement
Detecting DNS Root Manipulation, PDF
Ben Jones, Nick Feamster, Vern Paxson, Nicholas Weaver, Mark Allman
Springer, Cham, March 2016, International Conference on Passive and Active Network Measurement
Home Network or Access Link? Locating Last-Mile Downstream Throughput Bottlenecks, PDF
Srikanth Sundaresan, Nick Feamster, Renata Teixeira
March 2016, International Conference on Passive and Active Network Measurement
A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades, PDF
Sarthak Grover, Roya Ensafi, and Nick Feamster
March 2016,
Cybercrime Litigation, PDF
Jonathan Mayer
University of Pennsylvania Law Review, March 2016,
An Industrial-Scale Software Defined Internet Exchange Point, PDF
Arpit Gupta, Robert MacDavid, Rudiger Birkner, Marco Canini, Nick Feamster, Jennifer Rexford, Laurent Vanbever
March 2016, 3th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16)
Authorizing Network Control at Software Defined Internet Exchange Points, PDF
Arpit Gupta, Nick Feamster, Laurent Vanbever
ACM, March 2016, Proceedings of the Symposium on SDN Research
Revealing Utilization at Internet Interconnection Points, PDF
Nick Feamster
TPRC, March 2016,
Why buy when you can rent? Bribery attacks on Bitcoin consensus, PDF
Joseph Bonneau, Edward Felten, Steven Goldfeder, Joshua Kroll, Arvind Narayanan
February 2016,
Stressing Out: Bitcoin “Stress Testing”, PDF
Khaled Baqer, Danny Yuxing Huang, Damon McCoy, Nicholas Weaver
Springer, Berlin, Heidelberg, February 2016, International Conference on Financial Cryptography and Data Security
Towards More Gender Diversity in CS through an Artificial Intelligence Summer Program for High School Girls, PDF
Marie E Vachovsky, Grace Wu, Sorathan Chaturapruek, Olga Russakovsky, Richard Sommer, Li Fei-Fei
ACM, February 2016, Proceedings of the 47th ACM Technical Symposium on Computing Science Education
Report of the NSF Workshop on Software Defined Infrastructures and Software Defined Exchanges, PDF
Robert Ricci, Nick Feamster, Chip Elliott, Lawrence Landweber, David Farber
February 2016,


Wiki Surveys: Open and Quantifiable Social Data Collection, PDF
Matthew J. Salganik, Karen E. C. Levy
May 2015,


A Cross-National Study of Broadband Adoption: An Integrated Demand-Supply Perspective, PDF
Tithi Chattopadhyay
September 2011,
A Complex Systems Model of Industry Concentration and Broadband Infrastructure Investment, PDF
Kurtis DeMaagd, Erik D. Goodman, Johannes M. Bauer, Kendall J. Koning, Tithi Chattopadhyay, Nicolas Friederici
September 2011,