• Publications
  • Influence
The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data
TLDR
A theoretical framework to explain the differences among ISPs and empirically tested some of these explanations. Expand
  • 100
  • 9
  • PDF
Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States
Two case studies explore the reciprocal influence between technological change and Internet governance. Both focus on the use by Internet service providers of a new capability known as deep packetExpand
  • 65
  • 4
Security Economics in the HTTPS Value Chain
Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensiveExpand
  • 30
  • 3
  • PDF
Dimensioning the elephant: an empirical analysis of the IPv4 number market
One of the most important but least-studied aspects of Internet policy is the emergence of a trading market for previously allocated Internet number blocks. Without unique Internet protocol numbersExpand
  • 16
  • 3
  • PDF
Economics of Fighting Botnets: Lessons from a Decade of Mitigation
TLDR
The fight against botnets has been going on for more than a decade, but they still impose significant costs. Expand
  • 26
  • 2
  • PDF
How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation
TLDR
We present the first attempt towards estimating ISP and Internet-wide DHCP churn rates, in order to better understand the relation between IP addresses and hosts, as well as allow us to correct data relying on IP addresses as a surrogate metric. Expand
  • 22
  • 2
  • PDF
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union)
TLDR
The web is global, but privacy laws differ by country. Expand
  • 10
  • 2
  • PDF
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer
TLDR
We design an infrastructure to collect and synchronize measurements from five crowdsourcing platforms, collect data on network source address validation policies for CAIDA's Spoofer project. Expand
  • 8
  • 2
  • PDF
...
1
2
3
4
5
...