David R. Choffnes

Orcid: 0000-0001-7825-7226

Affiliations:
  • Northeastern University, Boston, USA


According to our database1, David R. Choffnes authored at least 118 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Gig Work at What Cost? Exploring Privacy Risks of Gig Work Platform Participation in the U.S.
Proc. Priv. Enhancing Technol., 2025

2024
Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants.
CoRR, 2024

SunBlock: Cloudless Protection for IoT Systems.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

IoT Bricks Over v6: Understanding IPv6 Usage in Smart Homes.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Fair or Fare? Understanding Automated Transcription Error Bias in Social Media and Videoconferencing Platforms.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE).
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Not Your Average App: A Large-scale Privacy Analysis of Android Browsers.
Proc. Priv. Enhancing Technol., January, 2023

Enhancing the ethics of user-sourced online data collection and sharing.
Nat. Comput. Sci., 2023

Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Localizing Traffic Differentiation.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

BehavIoT: Measuring Smart Home IoT Behavior Using Network-Inferred Behavior Models.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Understanding Dark Patterns in Home IoT Devices.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices.
Proc. Priv. Enhancing Technol., 2022

Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem.
CoRR, 2022

Internet scale reverse traceroute.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

A comparative analysis of certificate pinning in Android & iOS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Using reverse IP geolocation to identify institutional networks.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Exploring Deceptive Design Patterns in Voice Interfaces.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

Toward flexible auditing for in-network functionality.
Proceedings of the 3rd International CoNEXT Student Workshop, 2022

ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Blocking Without Breaking: Identification and Mitigation of Non-Essential IoT Traffic.
Proc. Priv. Enhancing Technol., 2021

A Comparative Study of Dark Patterns Across Web and Mobile Modalities.
Proc. ACM Hum. Comput. Interact., 2021

AnyOpt: predicting and optimizing IP Anycast performance.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

IoTLS: understanding TLS usage in consumer IoT devices.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Detecting consumer IoT devices through the lens of an ISP.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

2020
When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers.
Proc. Priv. Enhancing Technol., 2020

Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations.
CoRR, 2020

A Deeper Look at Web Content Availability and Consistency over HTTP/S.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Janus: A Multi-TCP Framework for Application-Aware Optimization in Mobile Networks.
IEEE Trans. Mob. Comput., 2019

Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources.
CoRR, 2019

Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols.
Commun. ACM, 2019

A large-scale analysis of deployed traffic differentiation practices.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Internet-QoE 2019: 4th Internet-QoE Workshop on QoE-based Analysis and Management of Data Communication Networks.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach.
Proceedings of the Internet Measurement Conference, 2019

RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins.
Proceedings of the Internet Measurement Conference, 2019

2018
Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications.
Proc. Priv. Enhancing Technol., 2018

AntShield: On-Device Detection of Personal Information Exposure.
CoRR, 2018

A First Look at Certification Authority Authorization (CAA).
Comput. Commun. Rev., 2018

Analysis of SSL certificate reissues and revocations in the wake of heartbleed.
Commun. ACM, 2018

Mile High WiFi: A First Look At In-Flight Internet Connectivity.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Is the Web Ready for OCSP Must-Staple?
Proceedings of the Internet Measurement Conference 2018, 2018

Measuring Adoption of Security Additions to the HTTPS Ecosystem.
Proceedings of the Applied Networking Research Workshop, 2018

2017
An End-to-End View of DNSSEC Ecosystem Management.
login Usenix Mag., 2017

Inside the Walled Garden: Deconstructing Facebook's Free Basics Program.
Comput. Commun. Rev., 2017

Summary of the Works-in-Progress Session at IMC'16.
Comput. Commun. Rev., 2017

CDNs Meet CN An Empirical Study of CDN Deployments in China.
IEEE Access, 2017

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.
Proceedings of the 26th USENIX Security Symposium, 2017

CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

An Empirical Analysis of Facebook's Free Basics.
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

lib•erate, (n): a library for exposing (traffic-classification) rules and avoiding them efficiently.
Proceedings of the 2017 Internet Measurement Conference, 2017

The record route option is an option!
Proceedings of the 2017 Internet Measurement Conference, 2017

Understanding the role of registrars in DNSSEC deployment.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting.
Comput. Networks, 2016

When IPs Fly: A Case for Redefining Airline Communication.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

BingeOn Under the Microscope: Understanding T-Mobiles Zero-Rating Implementation.
Proceedings of the 2016 workshop on QoE-based Analysis and Management of Data Communication Networks, 2016

Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Janus: Network- and application-aware multi-TCP optimization engine.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Measuring and Applying Invalid SSL Certificates: The Silent Majority.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

A Case for Personal Virtual Networks.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Measurement Experimentation Platform at the Internet's Edge.
IEEE/ACM Trans. Netw., 2015

suMMarY report for the First NSF Workshop on Mobile Community Measurement Infrastructure.
GetMobile Mob. Comput. Commun., 2015

Client-Side Web Proxy Detection from Unprivileged Mobile Devices.
CoRR, 2015

ReCon: Revealing and Controlling Privacy Leaks in Mobile Network Traffic.
CoRR, 2015

Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Investigating Transparent Web Proxies in Cellular Networks.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

Poster: Context-Triggered Mobile Network Measurement.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Demo: Mobilyzer: Mobile Network Measurement Made Easy.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Mobilyzer: An Open Platform for Controllable Mobile Network Measurements.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

An End-to-End Measurement of Certificate Revocation in the Web's PKI.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Identifying Traffic Differentiation in Mobile Networks.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Investigating Interdomain Routing Policies in the Wild.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
Where the Sidewalk Ends: Extending the Internet AS Graph Using Traceroutes from P2P Users.
IEEE Trans. Computers, 2014

Impact of heterogeneity and socioeconomic factors on individual behavior in decentralized sharing ecosystems.
Proc. Natl. Acad. Sci. USA, 2014

Identifying traffic differentiation on cellular data networks.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Diagnosing Path Inflation of Mobile Client Traffic.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Demo: Mapping global mobile performance trends with mobilyzer and mobiPerf.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

2013
Android Apps: What are they doing with your precious Internet?
Adv. Math. Commun., 2013

Towards efficient traffic-analysis resistant anonymity networks.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

PoiRoot: investigating the root cause of interdomain path changes.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Dasu: Pushing Experiments to the Internet's Edge.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

2012
LIFEGUARD: practical repair of persistent route failures.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Meddle: middleboxes for increased transparency and control of mobile traffic.
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012

2011
Measuring and predicting web login safety.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

On blind mice and the elephant: understanding the network impact of a large distributed system.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Crowdsourcing ISP characterization to the network edge.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

Privacy Revelations for Web and Mobile Apps.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Machiavellian routing: improving internet availability with BGP poisoning.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

2010
Taming the Torrent.
login Usenix Mag., 2010

Pitfalls for testbed evaluations of internet systems.
Comput. Commun. Rev., 2010

Crowdsourcing service-level network event monitoring.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Strange bedfellows: community identification in bittorrent.
Proceedings of the 9th international conference on Peer-to-peer systems, 2010

Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Drafting behind Akamai: inferring network conditions based on CDN redirections.
IEEE/ACM Trans. Netw., 2009

On the Effectiveness of Measurement Reuse for Performance-Based Detouring.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Migration policies for multi-core fair-share scheduling.
ACM SIGOPS Oper. Syst. Rev., 2008

Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Relative Network Positioning via CDN Redirections.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2006
Drafting behind Akamai (travelocity-based detouring).
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

2005
An integrated mobility and traffic model for vehicular wireless networks.
Proceedings of the Second International Workshop on Vehicular Ad Hoc Networks, 2005

Simply C++ - an application-driven tutorial approach.
Prentice Hall, ISBN: 978-0-13-127768-7, 2005


  Loading...