Publications
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
(2020). Coming of Age: A Longitudinal Study of TLS Deployment.
Proceedings of IMC 18.
(2018). The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem.
Proceedings of 18th Internet Measurement Conference (IMC'18).
(2018). Mission Accomplished? HTTPS Security after DigiNotar.
Proceedings of the IMC 2017.
(2017).
(2017). Viable Protection of High-Performance Networks through Hardware/Software Co-Design.
Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.
(2017). Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Measuring the Latency and Pervasiveness of TLS Certificate Revocation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium. 790-806.
(2016). Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data.
Proceedings of 2016 Annual Computer Security Applications Conference.
(2016). TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Towards a Complete View of the Certificate Ecosystem.
Proceeings of 16th Internet Measurement Conference (IMC'16).
(2016). Providing Dynamic Control to Passive Network Security Monitoring.
Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
(2015). Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data.
ICSI Technical Report.
(2015).
(2014).
(2014).
(2014).
(2013).
(2013).