default search action
Dave Levin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c71]Erik C. Rye, Dave Levin:
Surveilling the Masses with Wi-Fi-Based Positioning Systems. SP 2024: 2831-2846 - [e3]Narseo Vallina-Rodriguez, Guillermo Suarez-Tangil, Dave Levin, Cristel Pelsser:
Proceedings of the 2024 ACM on Internet Measurement Conference, IMC 2024, Madrid, Spain, November 4-6, 2024. ACM 2024, ISBN 979-8-4007-0592-2 [contents] - [i8]Erik C. Rye, Dave Levin:
Surveilling the Masses with Wi-Fi-Based Positioning Systems. CoRR abs/2405.14975 (2024) - [i7]Omer Akgul, Richard Roberts, Emma Shroyer, Dave Levin, Michelle L. Mazurek:
As Advertised? Understanding the Impact of Influencer VPN Ads. CoRR abs/2406.13017 (2024) - 2023
- [c70]Arushi Arora, Raj Karra, Dave Levin, Christina Garman:
Provably Avoiding Geographic Regions for Tor's Onion Services. FC (1) 2023: 289-305 - [c69]James Larisch, Waqar Aqeel, Taejoong Chung, Eddie Kohler, Dave Levin, Bruce M. Maggs, Bryan Parno, Christo Wilson:
No Root Store Left Behind. HotNets 2023: 295-301 - [c68]Leon Böck, Dave Levin, Ramakrishna Padmanabhan, Christian Doerr, Max Mühlhäuser:
How to Count Bots in Longitudinal Datasets of IP Addresses. NDSS 2023 - [c67]Abdulrahman Alaraj, Kevin Bock, Dave Levin, Eric Wustrow:
A Global Measurement of Routing Loops on the Internet. PAM 2023: 373-399 - [c66]Ram Sundara Raman, Louis-Henri Merino, Kevin Bock, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta:
Global, Passive Detection of Connection Tampering. SIGCOMM 2023: 622-636 - [c65]Erik C. Rye, Dave Levin:
IPv6 Hitlists at Scale: Be Careful What You Wish For. SIGCOMM 2023: 904-916 - [c64]Richard Roberts, Julio Poveda, Raley Roberts, Dave Levin:
Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones. SP 2023: 3332-3336 - [c63]Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow:
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. USENIX Security Symposium 2023: 2653-2670 - [c62]Sadia Nourin, Van Hong Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin:
Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country. WWW 2023: 1969-1979 - [i6]Sadia Nourin, Van Hong Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin:
Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country. CoRR abs/2304.04835 (2023) - [i5]Erik C. Rye, Dave Levin:
IPv6 Hitlists at Scale: Be Careful What You Wish For. CoRR abs/2307.15057 (2023) - [i4]Leon Böck, Valentin Sundermann, Isabella Fusari, Shankar Karuppayah, Max Mühlhäuser, Dave Levin:
The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants. CoRR abs/2309.01130 (2023) - 2022
- [c61]James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson:
Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies. CCS 2022: 1857-1870 - [c60]Amogh Pradeep, Muhammad Talha Paracha, Protick Bhowmick, Ali Davanian, Abbas Razaghpanah, Taejoong Chung, Martina Lindorfer, Narseo Vallina-Rodriguez, Dave Levin, David R. Choffnes:
A comparative analysis of certificate pinning in Android & iOS. IMC 2022: 605-618 - [c59]Omer Akgul, Richard Roberts, Moses Namara, Dave Levin, Michelle L. Mazurek:
Investigating Influencer VPN Ads on YouTube. SP 2022: 876-892 - [c58]Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin:
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies. USENIX Security Symposium 2022: 465-483 - 2021
- [c57]Lucianna Kiffer, Asad Salman, Dave Levin, Alan Mislove, Cristina Nita-Rotaru:
Under the Hood of the Ethereum Gossip Protocol. Financial Cryptography (2) 2021: 437-456 - [c56]Olamide Omolola, Richard Roberts, Md. Ishtiaq Ashiq, Taejoong Chung, Dave Levin, Alan Mislove:
Measurement and Analysis of Automated Certificate Reissuance. PAM 2021: 161-174 - [c55]Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin:
Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes. FOCI@SIGCOMM 2021: 1-7 - [c54]Marwan Fayed, Lorenz Bauer, Vasileios Giotsas, Sami Kerola, Marek Majkowski, Pavel Odintsov, Jakub Sitnicki, Taejoong Chung, Dave Levin, Alan Mislove, Christopher A. Wood, Nick Sullivan:
The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale. SIGCOMM 2021: 433-446 - [c53]Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Jayson Hurst, Christina Garman, Dave Levin:
Bento: safely bringing network function virtualization to Tor. SIGCOMM 2021: 821-835 - [c52]Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin:
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks. SP (Workshops) 2021: 398-409 - [c51]Soumya Indela, Dave Levin:
Sound Methodology for Downloading Webpages. TMA 2021 - [c50]Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin:
Weaponizing Middleboxes for TCP Reflected Amplification. USENIX Security Symposium 2021: 3345-3361 - [e2]Dave Levin, Alan Mislove, Johanna Amann, Matthew Luckie:
IMC '21: ACM Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021. ACM 2021, ISBN 978-1-4503-9129-0 [contents] - [e1]Oliver Hohlfeld, Andra Lutu, Dave Levin:
Passive and Active Measurement - 22nd International Conference, PAM 2021, Virtual Event, March 29 - April 1, 2021, Proceedings. Lecture Notes in Computer Science 12671, Springer 2021, ISBN 978-3-030-72581-5 [contents] - [i3]Aadesh Bagmar, Josiah Wedgwood, Dave Levin, Jim Purtilo:
I Know What You Imported Last Summer: A study of security threats in thePython ecosystem. CoRR abs/2102.06301 (2021) - 2020
- [j5]Kevin Bock, Dave Levin:
Automating the censorship arms race. XRDS 27(2): 30-35 (2020) - [j4]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. ACM Trans. Priv. Secur. 23(2): 10:1-10:36 (2020) - [c49]Anita Samarth, Kevin Chaney, Dave Levin, Adam White, Ricky Sahu:
API Connectivity: Real-World Uses and Implementation Experiences in using APIs and Third-party Apps for Data Exchange and Research. AMIA 2020 - [c48]Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Christina Garman, Dave Levin:
Bento: Bringing Network Function Virtualization to Tor. CCS 2020: 2109-2111 - [c47]Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin:
Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion. SIGCOMM 2020: 586-598 - [c46]Muhammad Talha Paracha, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin:
A Deeper Look at Web Content Availability and Consistency over HTTP/S. TMA 2020 - [c45]Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin:
Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister. FOCI @ USENIX Security Symposium 2020 - [c44]Stephen Herwig, Christina Garman, Dave Levin:
Achieving Keyless CDNs with Conclaves. USENIX Security Symposium 2020: 735-751
2010 – 2019
- 2019
- [c43]Kevin Bock, George Hughey, Xiao Qiang, Dave Levin:
Geneva: Evolving Censorship Evasion Strategies. CCS 2019: 2199-2214 - [c42]Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin:
You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates. CCS 2019: 2489-2504 - [c41]Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John P. Rula, Nick Sullivan:
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. Internet Measurement Conference 2019: 406-419 - [c40]Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin:
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet. NDSS 2019 - [c39]Ramakrishna Padmanabhan, Aaron Schulman, Alberto Dainotti, Dave Levin, Neil Spring:
How to Find Correlated Internet Failures. PAM 2019: 210-227 - [c38]Ramakrishna Padmanabhan, Aaron Schulman, Dave Levin, Neil Spring:
Residential links under the weather. SIGCOMM 2019: 145-158 - [c37]Richard Roberts, Dave Levin:
When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names. WPES@CCS 2019: 87-92 - [i2]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1907.01679 (2019) - 2018
- [j3]Liang Zhang, David R. Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, Christo Wilson:
Analysis of SSL certificate reissues and revocations in the wake of heartbleed. Commun. ACM 61(3): 109-116 (2018) - [c36]Dave Levin:
Session details: Session G3: Motion. Graphics Interface 2018 - [c35]Taejoong Chung, Jay Lok, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, John P. Rula, Nick Sullivan, Christo Wilson:
Is the Web Ready for OCSP Must-Staple? Internet Measurement Conference 2018: 105-118 - [c34]Lucianna Kiffer, Dave Levin, Alan Mislove:
Analyzing Ethereum's Contract Topology. Internet Measurement Conference 2018: 494-499 - [c33]Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee:
Internet anycast: performance, problems, & potential. SIGCOMM 2018: 59-73 - [c32]Kevin Bock, George Hughey, Dave Levin:
King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing. ASE @ USENIX Security Symposium 2018 - 2017
- [j2]Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
An End-to-End View of DNSSEC Ecosystem Management. login Usenix Mag. 42(4) (2017) - [c31]Lucianna Kiffer, Dave Levin, Alan Mislove:
Stick a fork in it: Analyzing the Ethereum network partition. HotNets 2017: 94-100 - [c30]Taejoong Chung, Roland van Rijswijk-Deij, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
Understanding the role of registrars in DNSSEC deployment. Internet Measurement Conference 2017: 369-383 - [c29]James Larisch, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers. IEEE Symposium on Security and Privacy 2017: 539-556 - [c28]Zhihao Li, Stephen Herwig, Dave Levin:
DeTor: Provably Avoiding Geographic Regions in Tor. USENIX Security Symposium 2017: 343-359 - [c27]Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
A Longitudinal, End-to-End View of the DNSSEC Ecosystem. USENIX Security Symposium 2017: 1307-1322 - [c26]Kevin Bock, Daven Patel, George Hughey, Dave Levin:
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge. WOOT 2017 - 2016
- [c25]Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem. CCS 2016: 628-640 - [c24]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CCS 2016: 690-703 - [c23]Liang Zhang, James Litton, Frank Cangialosi, Theophilus Benson, Dave Levin, Alan Mislove:
Picocenter: supporting long-lived, mostly-idle applications in cloud environments. EuroSys 2016: 37:1-37:16 - [c22]Taejoong Chung, Yabing Liu, David R. Choffnes, Dave Levin, Bruce MacDowell Maggs, Alan Mislove, Christo Wilson:
Measuring and Applying Invalid SSL Certificates: The Silent Majority. Internet Measurement Conference 2016: 527-541 - [i1]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1606.01881 (2016) - 2015
- [c21]Yabing Liu, Will Tome, Liang Zhang, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Aaron Schulman, Christo Wilson:
An End-to-End Measurement of Certificate Revocation in the Web's PKI. Internet Measurement Conference 2015: 183-196 - [c20]Frank Cangialosi, Dave Levin, Neil Spring:
Ting: Measuring and Exploiting Latencies Between All Tor Nodes. Internet Measurement Conference 2015: 289-302 - [c19]Ramakrishna Padmanabhan, Zhihao Li, Dave Levin, Neil Spring:
UAv6: Alias Resolution in IPv6 Using Unused Addresses. PAM 2015: 136-148 - [c18]Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee:
Alibi Routing. SIGCOMM 2015: 611-624 - [c17]Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin:
Programming slick network functions. SOSR 2015: 14:1-14:13 - 2014
- [c16]Aaron Schulman, Dave Levin, Neil Spring:
RevCast: Fast, Private Certificate Revocation over FM Radio. CCS 2014: 799-810 - [c15]Liang Zhang, David R. Choffnes, Dave Levin, Tudor Dumitras, Alan Mislove, Aaron Schulman, Christo Wilson:
Analysis of SSL certificate reissues and revocations in the wake of heartbleed. Internet Measurement Conference 2014: 489-502 - 2013
- [c14]Matthew Lentz, Dave Levin, Jason Castonguay, Neil Spring, Bobby Bhattacharjee:
D-mystifying the D-root address change. Internet Measurement Conference 2013: 57-62 - [c13]Muhammad Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin, Jennifer Rexford:
A slick control plane for network middleboxes. HotSDN 2013: 147-148 - 2010
- [j1]Dave Levin:
Review5 of algorithmic game theory: editors: Noam Nisan, Tim Roughgarden, Eva Tardos, Vijay V. Vazirani, publisher: Cambridge University Press ISBN: 978-0-521-87282-9. SIGACT News 41(4): 21-24 (2010) - [c12]Cristian Lumezanu, Dave Levin, Bo Han, Neil Spring, Bobby Bhattacharjee:
Don't love thy nearest neighbor. IPTPS 2010: 5
2000 – 2009
- 2009
- [c11]Dave Levin, Neil Spring, Bobby Bhattacharjee:
Systems-compatible incentives. GAMENETS 2009: 100-106 - [c10]Dave Levin, John R. Douceur, Jacob R. Lorch, Thomas Moscibroda:
TrInc: Small Trusted Hardware for Large Distributed Systems. NSDI 2009: 1-14 - [c9]Cristian Lumezanu, Randolph Baden, Dave Levin, Neil Spring, Bobby Bhattacharjee:
Symbiotic Relationships in Internet Routing Overlays. NSDI 2009: 467-480 - 2008
- [c8]Deepti Chafekar, Dave Levin, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan:
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. INFOCOM 2008: 1148-1156 - [c7]Aaron Schulman, Dave Levin, Neil Spring:
On the Fidelity of 802.11 Packet Traces. PAM 2008: 132-141 - [c6]Dave Levin, Randolph Baden, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee:
Motivating participation in internet routing overlays. NetEcon 2008: 91-96 - [c5]Dave Levin, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee:
Bittorrent is an auction: analyzing and improving bittorrent's incentives. SIGCOMM 2008: 243-254 - 2007
- [c4]Cristian Lumezanu, Dave Levin, Neil Spring:
PeerWise Discovery and Negotiation of Faster Paths. HotNets 2007 - [c3]Seungjoon Lee, Dave Levin, Vijay Gopalakrishnan, Bobby Bhattacharjee:
Backbone construction in selfish wireless networks. SIGMETRICS 2007: 121-132 - [c2]Adam Bender, Neil Spring, Dave Levin, Bobby Bhattacharjee:
Accountability as a Service. SRUTI 2007 - 2006
- [c1]Dave Levin, Rob Sherwood, Bobby Bhattacharjee:
Fair File Swarming with FOX. IPTPS 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint