All Stories

  1. Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
  2. P4runpro enables runtime programmability for the RMT programmable switches.
  3. Stable Hierarchical Routing for Operational LEO Networks
  4. Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers
  5. Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms
  6. Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services
  7. Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers
  8. A Case for Stateless Mobile Core Functions in Space
  9. A Networking Perspective on Starlink's Self-Driving LEO Mega-Constellation
  10. PACMem
  11. MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking
  12. Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence
  13. Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China
  14. Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms
  15. TopoScope
  16. DLBooster
  17. Who is answering my queries
  18. PreFix
  19. Secure DHCPv6 mechanism for DHCPv6 security and privacy protection
  20. Measuring BGP AS path looping (BAPL) and private AS number leaking (PANL)
  21. Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications
  22. CTE
  23. Recent progress in the study of the next generation Internet in China