Follow
Stephen Herwig
Stephen Herwig
Verified email at wm.edu
Title
Cited by
Cited by
Year
Measurement and analysis of Hajime, a peer-to-peer IoT botnet
S Herwig, K Harvey, G Hughey, R Roberts, D Levin
Network and Distributed Systems Security (NDSS) Symposium, 2019
1882019
Achieving Keyless {CDNs} with Conclaves
S Herwig, C Garman, D Levin
29th USENIX Security Symposium (USENIX Security 20), 735-751, 2020
252020
DeTor: Provably Avoiding Geographic Regions in Tor
Z Li, S Herwig, D Levin
26th USENIX Security Symposium (USENIX Security 17), 343-359, 2017
212017
Bento: Safely bringing network function virtualization to Tor
M Reininger, A Arora, S Herwig, N Francino, J Hurst, C Garman, D Levin
Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 821-835, 2021
92021
secmodel_sandbox: An application sandbox for NetBSD
S Herwig
Proceedings of the 14th BSDCan. Ottawa, June, 2017
32017
Towards Protecting Billions and Billions of Bits on the Interplanetary Internet
S Herwig
Workshop on Security of Space and Satellite Systems (SpaceSec) 2023, 2023
2023
Execution Environments for Running Legacy Applications in Multi-Party Trust Settings
S Herwig
University of Maryland, College Park, 2021
2021
Bento: Bringing Network Function Virtualization to Tor
M Reininger, A Arora, S Herwig, N Francino, C Garman, D Levin
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
2020
DNSql: Processing Massive DNS Collections
S Herwig, D Levin, B Bhattacharjee, N Spring
DNS And Internet Naming Research Directions (DINR) Workshop, 2016, 2016
2016
Scaling Computation of Graph Structured Data with NScale
K Xirogiannopoulos, SM Herwig, BC Chen, M Shao
2015
The system can't perform the operation now. Try again later.
Articles 1–10