Peeking behind the curtains of serverless platforms L Wang, M Li, Y Zhang, T Ristenpart, M Swift 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 133-146, 2018 | 657 | 2018 |
Seeing through network-protocol obfuscation L Wang, KP Dyer, A Akella, T Ristenpart, T Shrimpton Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 131 | 2015 |
Next stop, the cloud: Understanding modern web service deployment in ec2 and azure K He, A Fisher, L Wang, A Gember, A Akella, T Ristenpart Proceedings of the 2013 conference on Internet measurement conference, 177-190, 2013 | 102 | 2013 |
Sico: Surgical interception attacks by manipulating bgp communities H Birge-Lee, L Wang, J Rexford, P Mittal Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 49 | 2019 |
SPINE: Surveillance protection in the network elements T Datta, N Feamster, J Rexford, L Wang 9th USENIX Workshop on Free and Open Communications on the Internet, 2019 | 35 | 2019 |
Whowas: A platform for measuring web deployments on iaas clouds L Wang, A Nappa, J Caballero, T Ristenpart, A Akella Proceedings of the 2014 Conference on Internet Measurement Conference, 101-114, 2014 | 31 | 2014 |
Towards better understanding of Bitcoin unreachable peers L Wang, I Pustogarov arXiv preprint arXiv:1709.06837, 2017 | 29 | 2017 |
MIMIQ: Masking IPs with migration in QUIC Y Govil, L Wang, J Rexford 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2020 | 19 | 2020 |
Guarding serverless applications with seclambda DS Jegan, L Wang, S Bhagat, T Ristenpart, M Swift arXiv preprint arXiv:2011.05322, 2020 | 18 | 2020 |
Experiences deploying multi-vantage-point domain validation at let’s encrypt H Birge-Lee, L Wang USENIX Security, 2021 | 16 | 2021 |
Programmable In-Network Obfuscation of Traffic L Wang, H Kim, P Mittal, J Rexford arXiv preprint arXiv:2006.00097, 2020 | 16 | 2020 |
Blind certificate authorities L Wang, G Asharov, R Pass, T Ristenpart, A Shelat 2019 IEEE Symposium on Security and Privacy (SP), 1015-1032, 2019 | 16 | 2019 |
Programmable in-network obfuscation of DNS traffic L Wang, H Kim, P Mittal, J Rexford NDSS: DNS Privacy Workshop, 2021 | 14 | 2021 |
Side-channel attacks on shared search indexes L Wang, P Grubbs, J Lu, V Bindschaedler, D Cash, T Ristenpart 2017 IEEE Symposium on Security and Privacy (SP), 673-692, 2017 | 11 | 2017 |
Leveraging strategic connection migration-powered traffic splitting for privacy M Wang, A Kulshrestha, L Wang, P Mittal arXiv preprint arXiv:2205.03326, 2022 | 10 | 2022 |
Data-plane security applications in adversarial settings L Wang, P Mittal, J Rexford ACM SIGCOMM Computer Communication Review 52 (2), 2-9, 2022 | 6 | 2022 |
Creating a Secure Underlay for the Internet H Birge-Lee, J Wanner, GH Cimaszewski, J Kwon, L Wang, F Wirz, ... 31st USENIX Security Symposium (USENIX Security 22), 2601-2618, 2022 | 5 | 2022 |
Guarding Serverless Applications with Kalium DS Jegan, L Wang, S Bhagat, M Swift 32st USENIX Security Symposium (USENIX Security 23), 2022 | 3 | 2022 |
REDACT: refraction networking from the data center A Devraj, L Wang, J Rexford ACM SIGCOMM Computer Communication Review 51 (4), 15-22, 2021 | 3 | 2021 |
Secure channel injection and anonymous proofs of account ownership L Wang, R Pass, T Ristenpart Cryptology ePrint Archive, 2016 | 3 | 2016 |