What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nick Feamster
Google Scholar
38
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
"I Cannot Write This Because It Violates Our Content Policy": Understanding Content Moderation Policies and User Experiences in Generative AI Products.
Lan Gao
Oscar Chen
Rachel Lee
Nick Feamster
Chenhao Tan
Marshini Chetty
2025
conf/uss
The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing.
Keran Mu
Jianjun Chen
Jianwei Zhuge
Qi Li
Haixin Duan
Nick Feamster
2024
conf/uss
GFWeb: Measuring the Great Firewall's Web Censorship at Scale.
Nguyen Phong Hoang
Jakub Dalek
Masashi Crete-Nishihata
Nicolas Christin
Vinod Yegneswaran
Michalis Polychronakis
Nick Feamster
2024
conf/eurosp
Can Allowlists Capture the Variability of Home IoT Device Network Behavior?
Weijia He
Kevin Bryson
Ricardo Calderon
Vijay Prakash
Nick Feamster
Danny Yuxing Huang
Blase Ur
2024
conf/ndss
Acoustic Keystroke Leakage on Smart Televisions.
Tejas Kannan
Synthia Qia Wang
Max Sunog
Abraham Bueno de Mesquita
Nick Feamster
Henry Hoffmann
2023
conf/ccs
Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions.
Tejas Kannan
Nick Feamster
Henry Hoffmann
2023
conf/uss
User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.
Alexandra Nisenoff
Ranya Sharma
Nick Feamster
2022
conf/ccs
Poster: Investigating QUIC's Potential Impact on Censorship Circumvention.
Anna Harbluk Lorimer
Nick Feamster
Prateek Mittal
2022
conf/uss
How and Why People Use Virtual Private Networks.
Agnieszka Dutkowska-Zuk
Austin Hounsel
Amy Morrill
Andre Xiong
Marshini Chetty
Nick Feamster
2021
conf/ccs
New Directions in Automated Traffic Analysis.
Jordan Holland
Paul Schmitt
Nick Feamster
Prateek Mittal
2020
conf/uss
Identifying Disinformation Websites Using Infrastructure Features.
Austin Hounsel
Jordan Holland
Ben Kaiser
Kevin Borgolte
Nick Feamster
Jonathan R. Mayer
2019
journals/popets
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping.
Noah J. Apthorpe
Danny Yuxing Huang
Dillon Reisman
Arvind Narayanan
Nick Feamster
2019
journals/popets
Oblivious DNS: Practical Privacy for DNS Queries.
Paul Schmitt
Anne Edmundson
Allison Mankin
Nick Feamster
2019
conf/ccs
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Hooman Mohajeri Moghaddam
Gunes Acar
Ben Burgess
Arunesh Mathur
Danny Yuxing Huang
Nick Feamster
Edward W. Felten
Prateek Mittal
Arvind Narayanan
2019
conf/uss
Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA.
Noah J. Apthorpe
Sarah Varghese
Nick Feamster
2019
conf/uss
SPINE: Surveillance Protection in the Network Elements.
Trisha Datta
Nick Feamster
Jennifer Rexford
Liang Wang
2018
conf/uss
How Do Tor Users Interact With Onion Services?
Philipp Winter
Anne Edmundson
Laura M. Roberts
Agnieszka Dutkowska-Zuk
Marshini Chetty
Nick Feamster
2018
conf/uss
Automatically Generating a Large, Culture-Specific Blocklist for China.
Austin Hounsel
Prateek Mittal
Nick Feamster
2018
conf/sp
Machine Learning DDoS Detection for Consumer Internet of Things Devices.
Rohan Doshi
Noah J. Apthorpe
Nick Feamster
2017
conf/ccs
Cleartext Data Transmissions in Consumer IoT Medical Devices.
Daniel Wood
Noah J. Apthorpe
Nick Feamster
2017
conf/uss
Global Measurement of DNS Manipulation.
Paul Pearce
Ben Jones
Frank Li
Roya Ensafi
Nick Feamster
Nicholas Weaver
Vern Paxson
2017
conf/sp
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
Yixin Sun
Anne Edmundson
Nick Feamster
Mung Chiang
Prateek Mittal
2017
conf/sp
Augur: Internet-Wide Detection of Connectivity Disruptions.
Paul Pearce
Roya Ensafi
Frank Li
Nick Feamster
Vern Paxson
2017
conf/ndss
The Effect of DNS on Tor's Anonymity.
Benjamin Greschbach
Tobias Pulls
Laura M. Roberts
Philipp Winter
Nick Feamster
2016
conf/ccs
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Shuang Hao
Alex Kantchelian
Brad Miller
Vern Paxson
Nick Feamster
2016
conf/ccs
Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern Web.
Yogesh Mundada
Nick Feamster
Balachander Krishnamurthy
2016
conf/uss
Identifying and Characterizing Sybils in the Tor Network.
Philipp Winter
Roya Ensafi
Karsten Loesing
Nick Feamster
2014
conf/ccs
Deniable Liaisons.
Abhinav Narain
Nick Feamster
Alex C. Snoeren
2014
conf/uss
Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search.
Ben Jones
Sam Burnett
Nick Feamster
Sean P. Donovan
Sarthak Grover
Sathya Gunasekaran
Karim Habak
2013
conf/uss
Take This Personally: Pollution Attacks on Personalized Services.
Xinyu Xing
Wei Meng
Dan Doozan
Alex C. Snoeren
Nick Feamster
Wenke Lee
2013
conf/acsac
SilverLine: preventing data leaks from compromised web applications.
Yogesh Mundada
Anirudh Ramachandran
Nick Feamster
2011
conf/ccs
Boosting the scalability of botnet detection using adaptive traffic sampling.
Junjie Zhang
Xiapu Luo
Roberto Perdisci
Guofei Gu
Wenke Lee
Nick Feamster
2010
conf/uss
Building a Dynamic Reputation System for DNS.
Manos Antonakakis
Roberto Perdisci
David Dagon
Wenke Lee
Nick Feamster
2010
conf/uss
Chipping Away at Censorship Firewalls with User-Generated Content.
Sam Burnett
Nick Feamster
Santosh S. Vempala
2009
conf/uss
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
Shuang Hao
Nadeem Ahmed Syed
Nick Feamster
Alexander G. Gray
Sven Krasser
2007
conf/ccs
Filtering spam with behavioral blacklisting.
Anirudh Ramachandran
Nick Feamster
Santosh S. Vempala
2002
conf/uss
Infranet: Circumventing Web Censorship and Surveillance.
Nick Feamster
Magdalena Balazinska
Greg Harfst
Hari Balakrishnan
David R. Karger
2001
conf/uss
The Dos and Don'ts of Client Authentication on the Web.
Kevin Fu
Emil Sit
Kendra Smith
Nick Feamster
Coauthors
Abhinav Narain
(1)
Abraham Bueno de Mesquita
(1)
Agnieszka Dutkowska-Zuk
(2)
Alex C. Snoeren
(2)
Alex Kantchelian
(1)
Alexander G. Gray
(1)
Alexandra Nisenoff
(1)
Allison Mankin
(1)
Amy Morrill
(1)
Andre Xiong
(1)
Anirudh Ramachandran
(2)
Anna Harbluk Lorimer
(1)
Anne Edmundson
(3)
Arunesh Mathur
(1)
Arvind Narayanan
(2)
Austin Hounsel
(3)
Balachander Krishnamurthy
(1)
Ben Burgess
(1)
Ben Jones
(2)
Ben Kaiser
(1)
Benjamin Greschbach
(1)
Blase Ur
(1)
Brad Miller
(1)
Chenhao Tan
(1)
Dan Doozan
(1)
Daniel Wood
(1)
Danny Yuxing Huang
(3)
David Dagon
(1)
David R. Karger
(1)
Dillon Reisman
(1)
Edward W. Felten
(1)
Emil Sit
(1)
Frank Li
(2)
Greg Harfst
(1)
Gunes Acar
(1)
Guofei Gu
(1)
Haixin Duan
(1)
Hari Balakrishnan
(1)
Henry Hoffmann
(2)
Hooman Mohajeri Moghaddam
(1)
Jakub Dalek
(1)
Jennifer Rexford
(1)
Jianjun Chen
(1)
Jianwei Zhuge
(1)
Jonathan R. Mayer
(1)
Jordan Holland
(2)
Junjie Zhang
(1)
Karim Habak
(1)
Karsten Loesing
(1)
Kendra Smith
(1)
Keran Mu
(1)
Kevin Borgolte
(1)
Kevin Bryson
(1)
Kevin Fu
(1)
Lan Gao
(1)
Laura M. Roberts
(2)
Liang Wang
(1)
Magdalena Balazinska
(1)
Manos Antonakakis
(1)
Marshini Chetty
(3)
Masashi Crete-Nishihata
(1)
Max Sunog
(1)
Michalis Polychronakis
(1)
Mung Chiang
(1)
Nadeem Ahmed Syed
(1)
Nguyen Phong Hoang
(1)
Nicholas Weaver
(1)
Nick Feamster
(38)
Nicolas Christin
(1)
Noah J. Apthorpe
(4)
Oscar Chen
(1)
Paul Pearce
(2)
Paul Schmitt
(2)
Philipp Winter
(3)
Prateek Mittal
(5)
Qi Li
(1)
Rachel Lee
(1)
Ranya Sharma
(1)
Ricardo Calderon
(1)
Roberto Perdisci
(2)
Rohan Doshi
(1)
Roya Ensafi
(3)
Sam Burnett
(2)
Santosh S. Vempala
(2)
Sarah Varghese
(1)
Sarthak Grover
(1)
Sathya Gunasekaran
(1)
Sean P. Donovan
(1)
Shuang Hao
(2)
Sven Krasser
(1)
Synthia Qia Wang
(1)
Tejas Kannan
(2)
Tobias Pulls
(1)
Trisha Datta
(1)
Vern Paxson
(3)
Vijay Prakash
(1)
Vinod Yegneswaran
(1)
Wei Meng
(1)
Weijia He
(1)
Wenke Lee
(3)
Xiapu Luo
(1)
Xinyu Xing
(1)
Yixin Sun
(1)
Yogesh Mundada
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to