-
Tor Instead of IP
V. Liu, S. Han, A. Krishnamurthy, T. Anderson
HotNets, 2011
-
FairCloud: Sharing The Network In Cloud Computing
L. Popa, A. Krishnamurthy, S. Ratnasamy, I. Stoica
HotNets, 2011
-
Machiavellian Routing: Poisoning ISPs to Avoid Routing Problems
E. Katz-Bassett, D. Choffnes, C. Scott, I. Cunha, T. Anderson, A. Krishnamurthy
HotNets, 2011
-
Scalable Consistency in Scatter
L. Glendenning, I. Beschastnikh, A. Krishnamurthy, T. Anderson
SOSP, 2011
-
Mining Temporal Invariants from Partially Ordered Logs
I. Beschastnikh, Y. Brun, M. D. Ernst, A. Krishnamurthy, T. Anderson
SLAML, 2011
-
deSEO: Combating Search-Result Poisoning
J. John, F. Yu, Y. Xie, A. Krishnamurthy, M. Abadi
Usenix Security, 2011
-
Heat-seeking honeypots: design and experience
J. John, F. Yu, Y. Xie, A. Krishnamurthy, M. Abadi
WWW, 2011
-
ETTM: A Scalable Fault Tolerant Network Manager
C. Dixon, H. Uppal, V. Brajkovic, D, Brandon, T. Anderson, A. Krishnamurthy
NSDI, 2011.
-
A Cost Comparison of Datacenter Network Architectures
L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, I. Stoica
CoNEXT, 2010.
-
Resolving IP Aliases with Prespecified Timestamps
J. Sherry, E. Katz-Bassett, M. Pimenova, H. Madhyastha, T. Anderson, A. Krishnamurthy
IMC, 2010.
- Comet: An Active Distributed Key-Value Store
R. Geambasu, A. Levy, T. Kohno, A. Krishnamurthy, H. Levy
OSDI, 2010.
- Retaining Sandbox Containment Despite Bugs in Privileged Memory-safe Code
J. Cappos, A. Dadgar, J. Rasley, J. Samuel, I. Beschastnikh, C. Barsan, A. Krishnamurthy, T. Anderson
CCS, 2010.
- Improving the Performance and Robustness of P2P Live Streaming with Contracts
M. Piatek, A. Krishnamurthy
;login, 2010
- Privacy-preserving P2P data sharing with OneSwarm
T. Isdal, M. Piatek, A. Krishnamurthy, T. Anderson
Sigcomm, 2010.
- Searching the searchers using SearchAudit
J. John, F. Yu, Y. Xie, M. Abadi, A. Krishnamurthy
Usenix Security, 2010.
- Reverse Traceroute
E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wessep, T. Anderson, A. Krishnamurthy
NSDI, 2010.
- Contracts: Practical Contribution Incentives for P2P Live Streaming
M. Piatek, A. Krishnamurthy, A. Venkataramani, R. Yang, D. Zhang
NSDI, 2010.
- Moving Beyond End-to-End Path Information to Optimize CDN Performance
R. Krishnan, H. Madhyastha, S. Srinivasan, S. Jain, A. Krishnamurthy, T. Anderson, J. Gao
IMC, 2009.
- Pitfalls for ISP-friendly P2P Design
M. Piatek, H. Madhyastha, J. John, A. Krishnamurthy, T. Anderson
Hotnets, 2009.
- An End to the Middle
C. Dixon, A. Krishnamurthy, T. Anderson
HotOS, 2009.
- Studying Spamming Botnets using Botlab
J. John, A. Moshchuk, S. Gribble, A. Krishnamurthy
NSDI, 2009.
- iPlane Nano: Path Prediction for Peer-to-Peer Applications
H. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, A. Venkataramani
NSDI, 2009.
- Seattle: The Internet as a Testbed
J. Cappos, I. Beschastnikh, A. Krishnamurthy, T. Anderson.
SIGCSE, 2009
- P4P: Provider Portal for (P2P) Applications
H. Xie, R. Yang, A. Krishnamurthy, Y. Liu, A. Silberschatz
Sigcomm, 2008.
- Privacy-Preserving Location Tracking of Lost or Stolen Devices:
Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
T. Ristenpart, G. Maganis, A. Krishnamurthy, and T. Kohno
Usenix Security, 2008.
- Challenges and Directions for Monitoring P2P File Sharing Networks -or-
Why My Printer Received a DMCA Takedown Notice
M. Piatek, T. Kohno, and A. Krishnamurthy
HotSec, 2008.
- Consensus routing: the Internet as a distributed system
J. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson, A. Venkataramani
NSDI, 2008.
- Phalanx: Withstanding multimillion-node botnets
C. Dixon, T. Anderson, A. Krishnamurthy
NSDI, 2008.
- Studying blackholes in the Internet with Hubble
E. Katz-Bassett, H. Madhyastha, J. John, A. Krishnamurthy, D. Wetherall, T. Anderson
NSDI, 2008.
- One hop Reputations for Peer to Peer File Sharing Workloads
M. Piatek, T. Isdal, A. Krishnamurthy, T. Anderson
NSDI, 2008.
- Profiling a million user DHT
J. Falkner, M. Piatek, J. John, A. Krishnamurthy, T. Anderson
IMC, 2007.
- A case for holistic incentive design
M. Piatek, T. Anderson, A. Krishnamurthy
FuDiCo, 2007
- Building BitTyrant, a (More) Strategic BitTorrent Client
M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, A. Venkataramani
;login: (August 2007).
- Do incentives build robustness in BitTorrent?
M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, A. Venkataramani
NSDI, 2007.
- Leveraging BitTorrent for End Host Measurements
T. Isdal, M. Piatek, A. Krishnamurthy, T. Anderson
PAM, 2007.
- Towards IP Geolocation using Delay and Topology Measurements
E. Katz-Bassett, J. John, A. Krishnamurthy, D. Wetherall, T. Anderson, Y. Chawathe
IMC, 2006.
- A Structural Approach to Latency Prediction
H. Madhyastha, T. Anderson, A. Krishnamurthy, N. Spring, A. Venkataramani
IMC, 2006.
- iPlane: An Information Plane for Distributed Services
H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, A. Venkataramani
OSDI, 2006.
- Optimal Capacity Sharing of Network with Multiple Overlays
Z. Ma, J. Chen, R. Yang, A. Krishnamurthy
IWQoS, 2006.
- PCP: Efficient Endpoint Congestion Control
T. Anderson, A. Collins, A. Krishnamurthy, J. Zahorjan.
NSDI, 2006.
- Oasis: An Overlay-Aware Network Stack
H. Madhyastha, A. Venkataramani, A. Krishnamurthy, T. Anderson
Operating Systems Review, 2006.