Breakerspace papers by year

Below is a list of papers, talks, and posters involving at least one Breakerspace undergraduate student. To see a full list involving all of the graduate mentors' papers, go here.

2021

To appear Bento: Safely Bringing Network Function Virtualization to Tor
Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Christina Garman, Dave Levin
ACM SIGCOMM 2021
To appear Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
WOOT 2021 (IEEE Workshop on Offensive Technologies)
To appear Weaponizing Middleboxes for TCP Reflected Amplification
Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
USENIX Security 2021

2020

  pdf    www  Mental Models of Domain Names and URLs
Richard Roberts, Daniela Lulli, Abolee Raut, Kelsey Fulton, Dave Levin
Poster at SOUPS 2020 (Symposium On Usable Privacy and Security)
  pdf    www  Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister
Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
FOCI 2020 (USENIX Workshop on Free and Open Communications on the Internet)
  pdf    www  Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin
ACM SIGCOMM 2020
Applied Networking Research Prize 2021
  pdf    www  .how .you .spot .whoswho .online .sucks: Deceiving Users with Generic Top-Level Domains
Richard Roberts, Rachel Walter, Daniela Lulli, Dave Levin
ConPro 2020 (Workshop on Technology and Consumer Protection) Accepted Talk
 www  Geneva: An AI Approach to Evading Nation-State Censorship
Kevin Bock, George Hughey
BlueHat IL 2020

2019

  pdf    www  Geneva: Evolving Censorship Evasion Strategies
Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
ACM CCS 2019 (Conference on Computer and Communications Security)
  pdf    www  You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates
Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin
ACM CCS 2019 (Conference on Computer and Communications Security)
Learning Nation-State Censorship with Genetic Algorithms
Kevin Bock, George Hughey
AIMS 2019 (Workshop on Active Internet Measurements)
  pdf    www  Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin
NDSS 2019 (Network and Distributed System Security Symposium)

2018

 www  Target-Embedding Domain Impersonation in HTTPS Certificates
Richard Roberts, Yaelle Goldschlag, Dave Levin
Poster at ACM IMC 2018 (Internet Measurement Conference)
  poster    www  Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin
Poster at ACM IMC 2018 (Internet Measurement Conference)
 www  Detecting IoT Malware with Power Measurements
Rebecca Gelles, Kelsey Fulton, Rachel Walter, Dave Levin
Poster at ACM IMC 2018 (Internet Measurement Conference)
 www  Revocation Checking - why is this still so hard?
Kevin Bock
HotSec 2018 (USENIX Summit on Hot Topics in Security)
  pdf    www  King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing
Kevin Bock, George Hughey, Dave Levin
USENIX ASE 2018 (Workshop on Advances in Security Education)