Several papers showing development of the Internet and its protocols.
D. Clark,
“
The design philosophy of the DARPA internet protocols.”
SIGCOMM Comput. Commun. Rev. 18, 4 (
Aug 1988),
pp. 106–114
P. Karn and C. Partridge,
“
Improving round-trip time estimates in reliable transport protocols.” In
Proc. SIGCOMM ’87,
Stowe, Vermont, United States,
Aug 11–13, 1987
Lot of math for a simple idea. But also good introduction for
the problem and terminology.
V. Jacobson,
“
Congestion avoidance and control.” In
Proc. SIGCOMM ’88,
Stanford, California, United States,
Aug 16–18, 1988 W. Stevens,
“
RFC 2001: TCP Slow Start, Congestion Avoidance,
Fast Retransmit, and Fast Recovery Algorithms.”
Kevin Fall and Sally Floyd,
“
Simulation-based comparisons of Tahoe, Reno and SACK TCP.”
SIGCOMM Comput. Commun. Rev. 26, 3 (
Jul 1996),
pp. 5–21
Jianer Zhou, Zhenyu Li, Qinghua Wu, Peter Steenkiste, Steve Uhlig, Jun Li and Gaogang Xie,
“
TCP Stalls at the Server Side: Measurement and Mitigation.”
IEEE/ACM Trans. Networking 27, 1 (
Feb 2019),
pp. 272–287
Franziska Lichtblau, Florian Streibelt, Thorben Krüger, Philipp Richter and Anja Feldmann,
“
Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses.” In
Proc. IMC ’17,
London United Kingdom,
Nov 2017 Donghui Yang, Zhenyu Li and Gareth Tyson,
“
A Deep Dive into DNS Query Failures.” In
Proc. of the 2020 USENIX Annual Technical Conference (USENIX ATC 20),
2020,
pp. 507–514
Guanglei Song, Jiahai Yang, Lin He, Zhiliang Wang, Guo Li, Chenxin Duan, Yaozhong Liu and Zhongxiang Sun,
“
AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System.” In
Proc. of the 2022 USENIX Annual Technical Conference (USENIX ATC 22),
Carlsbad, CA,
2022,
pp. 309–326
Alden Hilton, Casey Deccio and Jacob Davis,
“
Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 3171–3186
Sharon Goldberg,
“
Why is it taking so long to secure internet routing?.”
Commun. ACM 57, 10 (
Sep 23, 2014),
pp. 56–63
Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula and Nick Sullivan,
“
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins.” In
Proc. IMC ’19,
Amsterdam Netherlands,
Oct 21, 2019 Thomas Holterbach, Thomas Alfroy, Amreesh Phokeer, Alberto Dainotti and Cristel Pelsser,
“
A System to Detect Forged-Origin BGP Hijacks.” In
Proc. of the 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24),
Santa Clara, CA,
2024,
pp. 1751–1770
Justin Furuness, Cameron Morris, Reynaldo Morillo, Amir Herzberg and Bing Wang,
“
BGPy: The BGP Python Security Simulator.” In
Proc. CSET 2023,
Marina del Rey CA USA,
Aug 7, 2023 We probably won't spend a lot of time with this one. It's mostly here
since it describes a bit of software that could be used for a project.
J. Martin, A. Nilsson and Injong Rhee,
“
Delay-based congestion avoidance for TCP.”
IEEE/ACM Trans. Networking 11, 3 (
Jun 2003),
pp. 356–369
This paper is old, but very unusual: It reports a negative.
Radhika Mittal, Justine Sherry, Sylvia Ratnasamy and Scott Shenker,
“
Recursively Cautious Congestion Control.” In
Proc. of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14),
Seattle, WA,
2014,
pp. 373–385
Adam Langley, Alistair Riddoch, Alyssa Wilk, Antonio Vicente, Charles Krasic, Dan Zhang, Fan Yang, Fedor Kouranov, Ian Swett, Janardhan Iyengar, Jeff Bailey, Jeremy Dorfman, Jim Roskind, Joanna Kulik, Patrik Westin, Raman Tenneti, Robbie Shade, Ryan Hamilton, Victor Vasiliev, Wan-Teh Chang and Zhongyi Shi,
“
The QUIC Transport Protocol: Design and Internet-Scale Deployment.” In
Proc. SIGCOMM ’17,
Los Angeles CA USA,
Aug 7, 2017 Simon Bauer, Patrick Sattler, Johannes Zirngibl, Christoph Schwarzenberg and Georg Carle,
“
Evaluating the Benefits: Quantifying the Effects of TCP Options, QUIC, and CDNs on Throughput.” In
Proc. ANRW ’23,
San Francisco CA USA,
Jul 22, 2023 Pengqiang Bi, Mengbai Xiao, Dongxiao Yu and Guanghui Zhang,
“
oBBR: Optimize Retransmissions of BBR Flows on the Internet.” In
Proc. of the 2023 USENIX Annual Technical Conference (USENIX ATC 23),
Boston, MA,
2023,
pp. 537–551
Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig and Taejoong Chung,
“
You’ve Got Report: Measurement and Security Implications of DMARC Reporting.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 4123–4137
Birk Blechschmidt and Ben Stock,
“
Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 4895–4912
Florian Holzbauer, Johanna Ullrich, Martina Lindorfer and Tobias Fiebig,
“
Not that Simple: Email Delivery in the 21st Century.” In
Proc. of the 2022 USENIX Annual Technical Conference (USENIX ATC 22),
Carlsbad, CA,
2022,
pp. 295–308
Jul 22 – 26
Jul 29 – Aug 2
Security
Domien Schepers, Aanjhan Ranganathan and Mathy Vanhoef,
“
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 53–68
James Larisch, Waqar Aqeel, Taejoong Chung, Eddie Kohler, Dave Levin, Bruce M. Maggs, Bryan Parno and Christo Wilson,
“
No Root Store Left Behind.” In
Proc. HotNets ’23,
Cambridge MA USA,
Nov 28, 2023 Héloïse Gollier and Mathy Vanhoef,
“
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network.” In
Proc. WiSec ’24,
Seoul Republic of Korea,
May 27, 2024 Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky and Jörg Schwenk,
“
We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 4877–4894
Nurullah Erinola, Marcel Maehren, Robert Merget, Juraj Somorovsky and Jörg Schwenk,
“
Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 4859–4876
Tim Berners-Lee posted the first web page on Aug. 6, 1991.
Some
others that sort of looked interesting. If you like one of these
better, or have found something else you would like to have the schedule,
we can probably rearrange it. Let me know.
Weitong Li, Zhexiao Lin, Md. Ishtiaq Ashiq, Emile Aben, Romain Fontugne, Amreesh Phokeer and Taejoong Chung,
“
RoVista: Measuring and Analyzing the Route Origin Validation (ROV) in RPKI.” In
Proc. IMC ’23,
Montreal QC Canada,
Oct 24, 2023 Pengqiang Bi, Mengbai Xiao, Dongxiao Yu and Guanghui Zhang,
“
oBBR: Optimize Retransmissions of BBR Flows on the Internet.” In
Proc. of the 2023 USENIX Annual Technical Conference (USENIX ATC 23),
Boston, MA,
2023,
pp. 537–551
Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin and Eric Wustrow,
“
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 2653–2670
Tomas Hlavacek, Haya Shulman, Niklas Vogel and Michael Waidner,
“
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 4841–4858
Sachin Kumar Singh, Shreeman Gautam, Cameron Cartier, Sameer Patil and Robert Ricci,
“
Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them.” In
Proc. of the 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24),
Santa Clara, CA,
2024,
pp. 1731–1750
Lixin Liu, Yuanjie Li, Hewu Li, Jiabo Yang, Wei Liu, Jingyi Lan, Yufeng Wang, Jiarui Li, Jianping Wu, Qian Wu, Jun Liu and Zeqi Lai,
“
Democratizing Direct-to-Cell Low Earth Orbit Satellite Networks.” In
Proc. of the 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24),
Santa Clara, CA,
2024,
pp. 791–808
Marco Squarcina, Pedro Adão, Lorenzo Veronese and Matteo Maffei,
“
Cookie Crumbles: Breaking and Fixing Web Session Integrity.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 5539–5556
Jonghoon Kwon, Jeonggyu Song, Junbeom Hur and Adrian Perrig,
“
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 6151–6166
Hammas Bin Tanveer, Rachee Singh, Paul Pearce and Rishab Nithyanand,
“
Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild.” In
Proc. of the 32nd USENIX Security Symposium (USENIX Security 23),
Anaheim, CA,
2023,
pp. 6221–6237
Serhat Arslan, Yuliang Li, Gautam Kumar and Nandita Dukkipati,
“
Bolt: Sub-RTT Congestion Control for Ultra-Low Latency.” In
Proc. of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23),
Boston, MA,
2023,
pp. 219–236
Sambhav Satija and Rahul Chatterjee,
“
BlindTLS: Circumventing TLS-based HTTPS censorship.” In
Proc. SIGCOMM ’21,
Virtual Event USA,
Aug 23, 2021 Renjie Zhao, Kejia Wang, Kai Zheng, Xinyu Zhang and Vincent Leung,
“
SlimWiFi: Ultra-Low-Power IoT Radio Architecture Enabled by Asymmetric Communication.” In
Proc. of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23),
Boston, MA,
2023,
pp. 1201–1219
Sam Kumar, Michael P Andersen, Hyung-Sin Kim and David E. Culler,
“
Performant TCP for Low-Power Wireless Networks .” In
Proc. of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20),
Santa Clara, CA,
2020,
pp. 911–932
Alireza Ameli Renani, Jun Huang, Guoliang Xing, Abdol-Hossein Esfahanian and Weiguo Wu,
“
Harnessing Hardware Defects for Improving Wireless Link Performance.”
IEEE/ACM Trans. Networking 28, 5 (
Oct 2020),
pp. 1913–1924