Follow
Nicholas Weaver
Nicholas Weaver
International Computer Science Institute
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
How to own the internet in your spare time
S Staniford, V Paxson, N Weaver
11th USENIX Security Symposium (USENIX Security 02), 2002
17782002
Inside the slammer worm
D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver
IEEE Security & Privacy 1 (4), 33-39, 2003
14692003
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
10342014
A taxonomy of computer worms
N Weaver, V Paxson, S Staniford, R Cunningham
Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003
7652003
Netalyzr: Illuminating the edge network
C Kreibich, N Weaver, B Nechaev, V Paxson
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010
4702010
Very fast containment of scanning worms, revisited
N Weaver, S Staniford, V Paxson
Malware Detection, 113-145, 2007
3952007
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3692011
Method and system for reducing the rate of infection of a communications network by a software worm
S Staniford, C Kahn, N Weaver, C Coit, R Jonkman
US Patent App. 10/313,623, 2004
3502004
The spread of the sapphire/slammer worm
D Moore
http://www. cs. berkeley. edu/~ nweaver/sapphire, 2003
3492003
The top speed of flash worms
S Staniford, D Moore, V Paxson, N Weaver
Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004
2952004
Protocol-independent adaptive replay of application dialog.
W Cui, V Paxson, N Weaver, RH Katz
NDSS, 2006
2812006
Global measurement of {DNS} manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson
26th USENIX Security Symposium (USENIX Security 17), 307-323, 2017
1872017
{PharmaLeaks}: Understanding the Business of Online Pharmaceutical Affiliate Programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
21st USENIX Security Symposium (USENIX Security 12), 1-16, 2012
1732012
{PharmaLeaks}: Understanding the Business of Online Pharmaceutical Affiliate Programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
21st USENIX Security Symposium (USENIX Security 12), 1-16, 2012
1732012
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
1632011
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
R Verdult, W Meng, FD Garcia, D Doozan, B Ege, W Enck, AC Snoeren, ...
22nd USENIX security symposium (USENIX Security 13), 687-702, 2013
1572013
Detecting In-Flight Page Changes with Web Tripwires.
C Reis, SD Gribble, T Kohno, NC Weaver
NSDI 8, 31-44, 2008
1522008
Warhol worms: The potential for very fast Internet plaques
N Weaver
http://www. cs. berkeley. edu/~ nweaver/warhol. html, 2001
1492001
The SFRA: a corner-turn FPGA architecture
N Weaver, J Hauser, J Wawrzynek
Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field …, 2004
1482004
Exploiting underlying structure for detailed reconstruction of an internet-scale event
A Kumar, V Paxson, N Weaver
Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 33-33, 2005
1442005
The system can't perform the operation now. Try again later.
Articles 1–20