• Publications
  • Influence
Bittorrent is an auction: analyzing and improving bittorrent's incentives
Incentives play a crucial role in BitTorrent, motivating users to upload to others to achieve fast download times for all peers. Though long believed to be robust to strategic manipulation, recentExpand
  • 197
  • 28
  • PDF
TrInc: Small Trusted Hardware for Large Distributed Systems
A simple yet remarkably powerful tool of selfish and malicious participants in a distributed system is "equivocation": making conflicting statements to others. We present TrInc, a small, trustedExpand
  • 153
  • 19
  • PDF
An End-to-End Measurement of Certificate Revocation in the Web's PKI
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously issued certificates. While the overall SSL ecosystem is well-studied, the frequency with whichExpand
  • 78
  • 14
  • PDF
Programming slick network functions
Current approaches to in-network traffic processing involve the deployment of monolithic middleboxes in virtual machines. These approaches make it difficult to reuse functionality across differentExpand
  • 73
  • 13
  • PDF
Discovering Bitcoin ’ s Public Topology and Influential Nodes
The Bitcoin network relies on peer-to-peer broadcast to distribute pending transactions and confirmed blocks. The topology over which this broadcast is distributed affects which nodes have advantagesExpand
  • 110
  • 9
  • PDF
Symbiotic Relationships in Internet Routing Overlays
We propose to construct routing overlay networks using the following principle: that overlay edges should be based on mutual advantage between pairs of hosts. Upon this principle, we design,Expand
  • 48
  • 9
  • PDF
Fair File Swarming with FOX
File swarming is a popular method of coordinated download by which peers obtain a file from an under-provisioned server. Critical problems arise within this domain when users act selfishly, yet mostExpand
  • 33
  • 5
  • PDF
A Longitudinal, End-to-End View of the DNSSEC Ecosystem
The Domain Name System's Security Extensions (DNSSEC) allow clients and resolvers to verify that DNS responses have not been forged or modified inflight. DNSSEC uses a public key infrastructure (PKI)Expand
  • 39
  • 4
  • PDF
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem
The semantics of online authentication in the web are rather straightforward: if Alice has a certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of Bob'sExpand
  • 37
  • 4
  • PDF