1. Tor Instead of IP
    V. Liu, S. Han, A. Krishnamurthy, T. Anderson
    HotNets, 2011

  2. FairCloud: Sharing The Network In Cloud Computing
    L. Popa, A. Krishnamurthy, S. Ratnasamy, I. Stoica
    HotNets, 2011

  3. Machiavellian Routing: Poisoning ISPs to Avoid Routing Problems
    E. Katz-Bassett, D. Choffnes, C. Scott, I. Cunha, T. Anderson, A. Krishnamurthy
    HotNets, 2011

  4. Scalable Consistency in Scatter
    L. Glendenning, I. Beschastnikh, A. Krishnamurthy, T. Anderson
    SOSP, 2011

  5. Mining Temporal Invariants from Partially Ordered Logs
    I. Beschastnikh, Y. Brun, M. D. Ernst, A. Krishnamurthy, T. Anderson
    SLAML, 2011

  6. deSEO: Combating Search-Result Poisoning
    J. John, F. Yu, Y. Xie, A. Krishnamurthy, M. Abadi
    Usenix Security, 2011

  7. Heat-seeking honeypots: design and experience
    J. John, F. Yu, Y. Xie, A. Krishnamurthy, M. Abadi
    WWW, 2011

  8. ETTM: A Scalable Fault Tolerant Network Manager
    C. Dixon, H. Uppal, V. Brajkovic, D, Brandon, T. Anderson, A. Krishnamurthy
    NSDI, 2011.

  9. A Cost Comparison of Datacenter Network Architectures
    L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, I. Stoica
    CoNEXT, 2010.

  10. Resolving IP Aliases with Prespecified Timestamps
    J. Sherry, E. Katz-Bassett, M. Pimenova, H. Madhyastha, T. Anderson, A. Krishnamurthy
    IMC, 2010.

  11. Comet: An Active Distributed Key-Value Store
    R. Geambasu, A. Levy, T. Kohno, A. Krishnamurthy, H. Levy
    OSDI, 2010.

  12. Retaining Sandbox Containment Despite Bugs in Privileged Memory-safe Code
    J. Cappos, A. Dadgar, J. Rasley, J. Samuel, I. Beschastnikh, C. Barsan, A. Krishnamurthy, T. Anderson
    CCS, 2010.

  13. Improving the Performance and Robustness of P2P Live Streaming with Contracts
    M. Piatek, A. Krishnamurthy
    ;login, 2010

  14. Privacy-preserving P2P data sharing with OneSwarm
    T. Isdal, M. Piatek, A. Krishnamurthy, T. Anderson
    Sigcomm, 2010.

  15. Searching the searchers using SearchAudit
    J. John, F. Yu, Y. Xie, M. Abadi, A. Krishnamurthy
    Usenix Security, 2010.

  16. Reverse Traceroute
    E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wessep, T. Anderson, A. Krishnamurthy
    NSDI, 2010.

  17. Contracts: Practical Contribution Incentives for P2P Live Streaming
    M. Piatek, A. Krishnamurthy, A. Venkataramani, R. Yang, D. Zhang
    NSDI, 2010.

  18. Moving Beyond End-to-End Path Information to Optimize CDN Performance
    R. Krishnan, H. Madhyastha, S. Srinivasan, S. Jain, A. Krishnamurthy, T. Anderson, J. Gao
    IMC, 2009.

  19. Pitfalls for ISP-friendly P2P Design
    M. Piatek, H. Madhyastha, J. John, A. Krishnamurthy, T. Anderson
    Hotnets, 2009.

  20. An End to the Middle
    C. Dixon, A. Krishnamurthy, T. Anderson
    HotOS, 2009.

  21. Studying Spamming Botnets using Botlab
    J. John, A. Moshchuk, S. Gribble, A. Krishnamurthy
    NSDI, 2009.

  22. iPlane Nano: Path Prediction for Peer-to-Peer Applications
    H. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, A. Venkataramani
    NSDI, 2009.

  23. Seattle: The Internet as a Testbed
    J. Cappos, I. Beschastnikh, A. Krishnamurthy, T. Anderson.
    SIGCSE, 2009

  24. P4P: Provider Portal for (P2P) Applications
    H. Xie, R. Yang, A. Krishnamurthy, Y. Liu, A. Silberschatz
    Sigcomm, 2008.

  25. Privacy-Preserving Location Tracking of Lost or Stolen Devices:
    Cryptographic Techniques and Replacing Trusted Third Parties with DHTs

    T. Ristenpart, G. Maganis, A. Krishnamurthy, and T. Kohno
    Usenix Security, 2008.

  26. Challenges and Directions for Monitoring P2P File Sharing Networks -or-
    Why My Printer Received a DMCA Takedown Notice

    M. Piatek, T. Kohno, and A. Krishnamurthy
    HotSec, 2008.

  27. Consensus routing: the Internet as a distributed system
    J. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson, A. Venkataramani
    NSDI, 2008.

  28. Phalanx: Withstanding multimillion-node botnets
    C. Dixon, T. Anderson, A. Krishnamurthy
    NSDI, 2008.

  29. Studying blackholes in the Internet with Hubble
    E. Katz-Bassett, H. Madhyastha, J. John, A. Krishnamurthy, D. Wetherall, T. Anderson
    NSDI, 2008.

  30. One hop Reputations for Peer to Peer File Sharing Workloads
    M. Piatek, T. Isdal, A. Krishnamurthy, T. Anderson
    NSDI, 2008.

  31. Profiling a million user DHT
    J. Falkner, M. Piatek, J. John, A. Krishnamurthy, T. Anderson
    IMC, 2007.

  32. A case for holistic incentive design
    M. Piatek, T. Anderson, A. Krishnamurthy
    FuDiCo, 2007

  33. Building BitTyrant, a (More) Strategic BitTorrent Client
    M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, A. Venkataramani
    ;login: (August 2007).

  34. Do incentives build robustness in BitTorrent?
    M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, A. Venkataramani
    NSDI, 2007.

  35. Leveraging BitTorrent for End Host Measurements
    T. Isdal, M. Piatek, A. Krishnamurthy, T. Anderson
    PAM, 2007.

  36. Towards IP Geolocation using Delay and Topology Measurements
    E. Katz-Bassett, J. John, A. Krishnamurthy, D. Wetherall, T. Anderson, Y. Chawathe
    IMC, 2006.

  37. A Structural Approach to Latency Prediction
    H. Madhyastha, T. Anderson, A. Krishnamurthy, N. Spring, A. Venkataramani
    IMC, 2006.

  38. iPlane: An Information Plane for Distributed Services
    H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, A. Venkataramani
    OSDI, 2006.

  39. Optimal Capacity Sharing of Network with Multiple Overlays
    Z. Ma, J. Chen, R. Yang, A. Krishnamurthy
    IWQoS, 2006.

  40. PCP: Efficient Endpoint Congestion Control
    T. Anderson, A. Collins, A. Krishnamurthy, J. Zahorjan.
    NSDI, 2006.

  41. Oasis: An Overlay-Aware Network Stack
    H. Madhyastha, A. Venkataramani, A. Krishnamurthy, T. Anderson
    Operating Systems Review, 2006.