Jeff Seibert

According to our database1, Jeff Seibert authored at least 15 papers between 2008 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems.
ACM Trans. Inf. Syst. Secur., 2015

2014
Newton: Securing Virtual Coordinates by Enforcing Physical Laws.
IEEE/ACM Trans. Netw., 2014

Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
Security and economic implications of localizing traffic in overlay networks
PhD thesis, 2012

The internet-wide impact of P2P traffic localization on ISP profitability.
IEEE/ACM Trans. Netw., 2012

Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Securing Virtual Coordinates by Enforcing Physical Laws.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

2011
A design for securing data delivery in mesh-based peer-to-peer streaming.
Comput. Networks, 2011

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

Applying game theory to analyze attacks and defenses in virtual coordinate systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Towards securing data delivery in peer-to-peer streaming.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

2008
Experimental comparison of peer-to-peer streaming overlays: An application perspective.
Proceedings of the LCN 2008, 2008


  Loading...