2024

   
  • Enabling Cross-Platform Comparison of Online Communities Using Content and Opinion Similarity
    Prasanna Lakkur Subramanyam, Jeng-Yu Chou, Kevin Nam, and Brian Neil Levine
    Findings of EMNLP, Nov. 2024.
    keywords:

    [show/hide bibtex]

  •    
  • A Quantitative Analysis of Inappropriate Content, Age Rating Compliance, and Risks to Youth on the Whisper Platform
    Jeng-Yu Chou and Brian Neil Levine
    International Workshop on Child Online Safety and Harms (COSH), July 2024.
    keywords: Child sexual exploitation

    [show/hide bibtex]

  •    
  • Triage of Messages and Conversations in a Large-Scale Child Victimization Corpus
    Prasanna Lakkur Subramanyam, Mohit Iyyer, and Brian Levine
    Proc. ACM The Web Conference (Web4Good Track), May 2024.
    keywords: Child sexual exploitation

    [show/hide bibtex]

  •    
  • Chapter: Reference Guide on Computer Science [To appear]
    Brian N. Levine, Joanne Pasquarelli, and Clay Shields
    Reference Manual on Scientific Evidence (Fourth Edition), National Academies of Sciences, Engineering, and Medicine, 2024.
    keywords: forensics

    [show/hide bibtex]


  • 2022

       
  • Pricing Security in Proof-of-Work Systems
    George Bissias, Rainer B{\"o}hme, David Thibodeau, and Brian Levine
    Proc. Workshop on the Economics of Information Security (WEIS), pages 32. June 2022.
    keywords: blockchain

    [show/hide bibtex]

  •    
  • Indications of Child Sexual Abuse Revealed in App-Store Reviews
    Brian Levine, Jagath Jai Kumar, Hany Farid, Eloghosa Ikponmwoba, and Ed Dixon
    USENIX SOUPS 2022: Workshop on Kids' Online Privacy and Safety, pages 4. May 2022.
    keywords: Child sexual exploitation; privacy

    [show/hide bibtex]

  •    
  • Report to Congress: Increasing the Efficacy of Investigations of Online Child Sexual Exploitation
    Brian Levine
    Technical Report NCJ Number 301590, National Institute of Justice, pages 164. May 2022.
    keywords: Child sexual exploitation; forensics; privacy

    [show/hide bibtex]


  • 2020

       
  • A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet.
    Brian Neil Levine, Marc Liberatore, Brian Lynn, and Matthew Wright
    Proc. ACM Conference on Computer \& Communications Security (CCS), October 2020.
    keywords: security; forensics; peer-to-peer; anonymity; Child sexual exploitation

    [show/hide bibtex]

  •    
  • Re-identification of Mobile Devices Using Real-Time Bidding Advertising Networks
    Keen Sung, JianYi Huang, Mark D. Corner, and Brian N. Levine
    Proc. ACM International Conference on Mobile Computing and Networking (MobiCom)., September 2020.
    keywords: advertising; cellular; security; privacy

    [show/hide bibtex]

  •    
  • Protecting location privacy from untrusted wireless service providers
    Keen Sung, Brian Neil Levine, and Mariya Zheleva
    Proc. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), July 2020.
    keywords: cellular; privacy

    [show/hide bibtex]

  •    
  • Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance
    George Bissias and Brian Neil Levine
    Proc. ISOC Symposium Network and Distributed System Security (NDSS), February 2020. [arxiv techrep]
    keywords: blockchain; security

    [show/hide bibtex]

  •    
  • Tor Hidden Services Are a Failed Technology, Harming Children, Dissidents and Journalists
    Brian Neil Levine and Brian Lynn
    Lawfare, January 17 2020.
    keywords: Child sexual exploitation; anonymity; forensics; privacy

    [show/hide bibtex]


  • 2019

       
  • Bonded Mining: Difficulty Adjustment by Miner Commitment
    George Bissias, David Thibodeau, and Brian Neil Levine
    Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology (CBT'19), September 2019.
    keywords: blockchain

    [show/hide bibtex]

  •    
  • Shining Light on Internet-based Crimes Against Children
    Brian Neil Levine
    Proc. USENIX Security Symposium, August 2019.
    keywords: Child sexual exploitation

    [show/hide bibtex]

  •    
  • Graphene: Efficient Interactive Set Reconciliation Applied to Blockchain Propagation
    A. Pinar Ozisik, Brian Neil Levine, George Bissias, Gavin Andresen, Darren Tapp, and Sunny Katkuri
    Proc. of ACM SIGCOMM, August 2019.
    keywords: blockchain; peer-to-peer

    [show/hide bibtex]

  •    
  • Server-side traffic analysis reveals mobile location information over the Internet
    Keen Sung, Joydeep Biswas, Erik Learned-Miller, Brian Neil Levine, and Marc Liberatore
    ACM Transactions on Mobile Computing 18(6), pages 1407–1418. June 2019.
    keywords: privacy; cellular;Journal Paper

    [show/hide bibtex]


  • 2018

       
  • Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies
    George Bissias, Brian Neil Levine, and David Thibodeau
    Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology (CBT'18), pages 155–172. September 2018.
    keywords: blockchain

    [show/hide bibtex]

  •    
  • MicroMobile: Leveraging Mobile Advertising for Large-Scale Experimentation
    Mark D. Corner and Brian Neil Levine
    Proceedings ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 310–322. June 2018.
    keywords: advertising;cellular

    [show/hide bibtex]


  • 2017

       
  • Forensic Identification of Anonymous Sources in OneSwarm
    George Bissias, Brian Neil Levine, Marc Liberatore, and Swagatika Prusty
    IEEE Transactions on Dependable and Secure Computing 14(6), pages 620-632. November 2017.
    keywords: forensics; peer-to-peer; anonymity; Journal Paper

    [show/hide bibtex]

  •    
  • Market-based Security for Distributed Applications
    George Bissias, Brian Neil Levine, and Nikunj Kapadia
    Proc. of New Security Paradigms Workshop [draft version was: arXiv:1701.03945], pages 19–34. October 2017.
    keywords: blockchain; security

    [show/hide bibtex]

  •    
  • Advertising-based Measurement: A Platform of 7 Billion Mobile Devices
    Mark D. Corner, Brian Neil Levine, Omar Ismail, and Angela Upreti
    ACM International Conference on Mobile Computing and Networking (MobiCom), pages 435–447. October 2017. [addendum]
    keywords: wireless; cellular; advertising

    [show/hide bibtex]

  •    
  • Graphene: A New Protocol for Block Propagation Using Set Reconciliation
    A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, and Brian Neil Levine
    Proc. of International Workshop on Cryptocurrencies and Blockchain Technology (ESORICS Workshop) [see also Technical Report UM-CS-2016-006, University of Massachusetts, October 2016], pages 420–428. September 2017.
    keywords: blockchain; peer-to-peer

    [show/hide bibtex]

  •    
  • Estimation of Miner Hash Rates and Consensus on Blockchains
    A. Pinar Ozisik, George Bissias, and Brian Neil Levine
    Technical Report arXiv:1707.00082, University of Massachusetts, July 2017. [arxiv techrep] [demo]
    keywords: blockchain; security

    [show/hide bibtex]

  •    
  • Statistical Detection of Downloaders in Freenet
    Brian Neil Levine, Marc Liberatore, Brian Lynn, and Matthew Wright
    Proc. IEEE International Workshop on Privacy Engineering, pages 25–32. May 2017.
    keywords: security; forensics; peer-to-peer; anonymity; Child sexual exploitation

    [show/hide bibtex]

  •    
  • An Explanation of Nakamoto's Analysis of Double-spend Attacks
    A. Pinar Ozisik and Brian Neil Levine
    Technical Report arXiv:1701.03977, University of Massachusetts, January 2017. [arxiv pdf]
    keywords: blockchain; security

    [show/hide bibtex]


  • 2016

       
  • An Analysis of Attacks on Blockchain Consensus
    George Bissias, Brian Neil Levine, A. Pinar Ozisik, and Gavin Andresen
    Technical Report arXiv:1610.07985, University of Massachusetts, October 2016. [arxiv techrep]
    keywords: blockchain; security

    [show/hide bibtex]

  •    
  • Characterization of Contact Offenders and Child Exploitation Material Trafficking on Five Peer-to-Peer Networks
    George Bissias, Brian Neil Levine, Marc Liberatore, Brian Lynn, Juston Moore, Hanna Wallach, and Janis Wolak
    Elsevier Child Abuse & Neglect, pages 185–199. February 2016.
    keywords: forensics; peer-to-peer;Child sexual exploitation;Journal Paper

    [show/hide bibtex]


  • 2015

       
  • Discovering Specification Violations in Networked Software Systems
    Robert J. Walls, Yuriy Brun, Marc Liberatore, and Brian Neil Levine
    Proc. IEEE International Symposium on Software Reliability Engineering, pages 496–506. November 2015.
    keywords: security

    [show/hide bibtex]


  • 2014

       
  • Sybil-Resistant Mixing for Bitcoin
    George Bissias, A. Pinar Ozisik, Brian Neil Levine, and Marc Liberatore
    Proc. ACM Workshop on Privacy in the Electronic Society, pages 149–158. November 2014. [slides]
    keywords: Privacy; blockchain; Sybil attack; Peer-to-peer

    [show/hide bibtex]

  •    
  • Efficient Smart Phone Forensics Based on Relevance Feedback
    Saksham Varma, Robert J. Walls, Brian Lynn, and Brian Neil Levine
    Proc. ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pages 81–91. November 2014. [slides] [source code]
    keywords: forensics

    [show/hide bibtex]

  •    
  • Efficient Tagging of Remote Peers During Child Pornography Investigations
    Marc Liberatore, Brian Neil Levine, Clay Shields, and Brian Lynn
    IEEE Transactions on Dependable and Secure Computing 11(5), pages 425–439. September 2014.
    keywords: forensics; peer-to-peer; Journal Paper; Child sexual exploitation

    [show/hide bibtex]

  •    
  • Location Privacy without Carrier Cooperation
    Keen Sung, Brian Neil Levine, and Marc Liberatore
    Proc. IEEE Workshop on Mobile System Technologies (MoST), May 2014. [slides]
    keywords: Privacy; Cellular; Remote Inference; security

    [show/hide bibtex]

  •    
  • Measuring a year of child pornography trafficking by US computers on a peer-to-peer network
    Janis Wolak, Marc Liberatore, and Brian Neil Levine
    Elsevier Child Abuse & Neglect 38(2), pages 347–356. February 2014.
    keywords: Peer-to-peer; Child sexual exploitation; Journal Paper; forensics

    [show/hide bibtex]


  • 2013

       
  • Turning Off GPS is Not Enough: Cellular location leaks over the Internet
    Hamed Soroush, Keen Sung, Erik Learned-Miller, Brian Neil Levine, and Marc Liberatore
    Proc. Privacy Enhancing Technologies Symposium (PETS), pages 103–122. July 2013. [traces]
    keywords: Privacy; Cellular; Remote Inference

    [show/hide bibtex]

  •    
  • Measurement and Analysis of Child Pornography Trafficking on P2P Networks
    Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls, Jeannie Albrecht, Emmanuel Cecchet, Brian Neil Levine, Marc Liberatore, Brian Lynn, and Janis Wolak
    Proc. Intl. World Wide Web Conference (WWW). Runner-Up for Best Paper Award., pages 631–642. May 2013. [slides] [techreport]
    keywords: forensics; peer-to-peer; Award Paper; Child sexual exploitation

    [show/hide bibtex]

  •    
  • Disambiguation of Residential Wired and Wireless Access in a Forensic Setting
    Sookhyun Yang, Jim Kurose, and Brian Neil Levine
    Proc. IEEE INFOCOM Mini-Conference, pages 5. April 2013.
    keywords: forensics; wireless; Synthesis project

    [show/hide bibtex]


  • 2012

       
  • Functional Privacy or Why Cookies are Better with Milk
    Robert J. Walls, Shane S. Clark, and Brian Neil Levine
    Proc. USENIX Workshop on Hot Topics in Security, August 2012. [source code] [workshop]
    keywords: privacy

    [show/hide bibtex]


  • 2011

       
  • Low Spreading Loss in Underwater Acoustic Networks Reduces RTS/CTS Effectiveness
    James W. Partan, Jim Kurose, Brian Neil Levine, and James Preisig
    Proc. ACM International Workshop on UnderWater Networks (WUWNet), December 2011.
    keywords: MAC Protocols; wireless; underwater; Synthesis project

    [show/hide bibtex]

  •    
  • Concurrent Wi-Fi for Mobile Users: Analysis and Measurements
    Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Brian Neil Levine, Mark D. Corner, and Landon Cox
    Proc. ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), pages 12. December 2011.
    keywords: DOME; wireless

    [show/hide bibtex]

  •    
  • Forensic Investigation of the OneSwarm Anonymous Filesharing System
    Swagatika Prusty, Brian Neil Levine, and Marc Liberatore
    Proc. ACM Conference on Computer \& Communications Security (CCS), pages 201–214. October 2011. [slides]
    keywords: forensics; peer-to-peer; anonymity

    [show/hide bibtex]

  •    
  • A retrospective look at the UMass DOME mobile testbed (invited)
    Hamed Soroush, Nilanjan Banerjee, Mark Corner, Brian Levine, and Brian Lynn
    ACM SIGMOBILE Mobile Computing and Communications Review 15(4), pages 2–15. October 2011.
    keywords: DOME; wireless

    [show/hide bibtex]

  •    
  • Economic Incentives for Protecting Digital Rights Online
    N. Boris Margolin, Brian Neil Levine, James D. Miller, and Matthew Wright
    Elsevier Electronic Commerce Research and Applications 10(5), pages 553-564. September 2011. [doi]
    keywords: security; Sybil attack; Journal Paper

    [show/hide bibtex]

  •    
  • Spider: Improving Mobile Networking with Concurrent Wi-Fi Connections (Poster)
    Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Brian Neil Levine, Mark D. Corner, and Landon Cox
    Proc. ACM SIGCOMM, August 2011.
    keywords: DOME; wireless

    [show/hide bibtex]

  •    
  • Forensic Triage for Mobile Phones with DEC0DE
    Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine
    Proc. USENIX Security Symposium, August 2011. [audio] [slides] [source code] [video]
    keywords: forensics; Synthesis project

    [show/hide bibtex]

  •    
  • Effective Digital Forensics Research is Investigator-Centric
    Robert J. Walls, Brian Neil Levine, Marc Liberatore, and Clay Shields
    Proc. USENIX Workshop on Hot Topics in Security (HotSec), August 2011. [audio] [slides] [video]
    keywords: forensics; security

    [show/hide bibtex]

  •    
  • Empirical Tests of Anonymous Voice Over IP
    Marc Liberatore, Bikas Gurung, Brian Neil Levine, and Matthew Wright
    Elsevier Journal of Network and Computer Applications 34(1), pages 341-350. January 2011.
    keywords: privacy; anonymity; peer-to-peer; Journal Paper

    [show/hide bibtex]


  • 2010

       
  • Assessing the Vulnerability of Replicated Network Services
    George Bissias, Brian Neil Levine, and Ramesh Sitaraman
    Proc. ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT), November 2010. [slides]
    keywords: security; wireless; routing

    [show/hide bibtex]

  •    
  • Strengthening Forensic Investigations of Child Pornography on P2P Networks
    Marc Liberatore, Brian Neil Levine, and Clay Shields
    Proc. ACM Conference on Future Networking Technologies (CoNEXT), November 2010. [slides]
    keywords: forensics; peer-to-peer; Child sexual exploitation

    [show/hide bibtex]

  •    
  • Reverse Engineering for Mobile Systems Forensics with Ares
    John Tuttle, Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine
    Proc. ACM Workshop on Insider Threats, October 2010. [workshop]
    keywords: forensics

    [show/hide bibtex]

  •    
  • Forensic Investigation of Peer-to-Peer File Sharing Networks
    Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine, and Clay Shields
    Proc. DFRWS Annual Digital Forensics Research Conference, August 2010. [correction]
    keywords: forensics; peer-to-peer; Child sexual exploitation

    [show/hide bibtex]

  •    
  • Spatial Reuse in Underwater Acoustic Networks using RTS/CTS MAC Protocols
    James W. Partan, Jim Kurose, Brian Neil Levine, and James Preisig
    Technical Report UM-CS-2010-045, University of Massachusetts Amherst, July 2010.
    keywords: MAC Protocols; wireless; underwater; Tech report; Synthesis project

    [show/hide bibtex]

  •    
  • Replication Routing in DTNs: A Resource Allocation Approach
    Aruna Balasubramanian, Brian Neil Levine, and Arun Venkataramani
    IEEE/ACM Transactions on Networking 18(2), pages 596–609. April 2010.
    keywords: DTN; routing; Journal Paper; wireless; DOME

    [show/hide bibtex]

  •    
  • Design and Field Experimentation of an Energy-Efficient Architecture for DTN Throwboxes
    Nilanjan Banerjee, Mark D. Corner, and Brian Neil Levine
    IEEE/ACM Transactions on Networking 18(2), pages 554–567. April 2010.
    keywords: Power Management; DTN; Journal Paper; DOME

    [show/hide bibtex]


  • 2009

       
  • DEX: Digital Evidence Provenance Supporting Reproducibility and Comparison
    Brian Neil Levine and Marc Liberatore
    Proc. of DFRWS Annual Conference, August 2009. [conference] [source code]
    keywords: forensics

    [show/hide bibtex]

  •    
  • Auditing and Forensic Analysis
    Brian Neil Levine and Gerome Miklau
    Unknown venue (type=incollection), June 2009. [table of contents]
    keywords: forensics; database security;

    [show/hide bibtex]

  •    
  • DOME: A Diverse Outdoor Mobile Testbed
    Hamed Soroush, Nilanjan Banerjee, Aruna Balasubramanian, Mark D. Corner, Brian Neil Levine, and Brian Lynn
    Proc. ACM Intl. Workshop on Hot Topics of Planet-Scale Mobility Measurements (HotPlanet), June 2009. [techreport]
    keywords: Wireless, DTN; DOME

    [show/hide bibtex]


  • 2008

       
  • Enhancing Child Safety \& Online Technologies. Appendix D: Technology Advisory Board Report
    Laura DeBonis, Ben Adida, Scott Bradner, Hany Farid, Lee Hollaar, Todd Inskeep, Brian Neil Levine, Adi Mcabian, R.L. Morgan, Lam Nguyen, Jeff Schiller, and Danny Weitzner
    Technical Report , Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States, December 2008. [appendix d] [full report]
    keywords: peer-to-peer; forensics

    [show/hide bibtex]

  •    
  • Enabling Interactive Web Applications in Hybrid Networks
    Aruna Balasubramanian, Brian Neil Levine, and Arun Venkataramani
    Proc. ACM Mobicom, pages 70–80. September 2008.
    keywords: wireless; DTN; information retrieval; DOME

    [show/hide bibtex]

  •    
  • Relays, Base Stations, and Meshes: Enhancing Mobile Networks with Infrastructure
    Nilanjan Banerjee, Mark D. Corner, Don Towsley, and Brian Neil Levine
    Proc. ACM Mobicom, pages 81–91. September 2008. [traces]
    keywords: Wireless; DTN; DOME

    [show/hide bibtex]

  •    
  • Interactive WiFi Connectivity for Moving Vehicles
    Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, and John Zahorjan
    Proc. ACM SIGCOMM, pages 427–438. August 2008. [slides] [traces]
    keywords: wireless; DTN; DOME

    [show/hide bibtex]

  •    
  • MORA Routing and Capacity Building in Disruption-Tolerant Networks
    Brendan Burns, Oliver Brock, and Brian Neil Levine
    Elsevier Ad hoc Networks Journal 6(4), pages 600-620. June 2008.
    keywords: DTN; routing; Synthesis project; Journal Paper; DOME

    [show/hide bibtex]

  •    
  • Passive-Logging Attacks Against Anonymous Communications Systems
    Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields
    ACM Transactions on Information and System Security (TISSEC) 11(2), pages 1–34. May 2008.
    keywords: anonymity; peer-to-peer;Journal Paper

    [show/hide bibtex]

  •    
  • Quantifying Resistance to the Sybil Attack
    N. Boris Margolin and Brian Neil Levine
    Proc. Financial Cryptography and Data Security (FC), pages 1–15. January 2008.
    keywords: Sybil attack; peer-to-peer; anonymity

    [show/hide bibtex]


  • 2007

       
  • A Survey of Practical Issues in Underwater Networks
    James W. Partan, Jim Kurose, and Brian Neil Levine
    Special Issue of ACM Mobile Computing Communications Review 11(4), pages 23–33. October 2007.
    keywords: DTN; underwater; wireless; DOME; Journal Paper

    [show/hide bibtex]

  •    
  • Surviving Attacks on Disruption-Tolerant Networks without Authentication
    John Burgess, George Bissias, Mark D. Corner, and Brian Neil Levine
    Proc. ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc), pages 61–70. September 2007. [slides] [traces]
    keywords: DTN; wireless; security; routing; DOME

    [show/hide bibtex]

  •    
  • Study of a Bus-Based Disruption Tolerant Network: Mobility Modeling and Impact on Routing
    Xiaolan Zhang, Jim Kurose, Brian Neil Levine, Don Towsley, and Honggang Zhang
    Proc. ACM Intl. Conf. on Mobile Computing and Networking (Mobicom), pages 195–206. September 2007. [acm] [slides] [traces]
    keywords: DTN; routing; wireless;DOME

    [show/hide bibtex]

  •    
  • Web Search From a Bus
    Aruna Balasubramanian, Yun Zhou, W. Bruce Croft, Brian Neil Levine, and Arun Venkataramani
    Proc. ACM Workshop on Challenged Networks (CHANTS), pages 59–66. September 2007. [pdf] [traces]
    keywords: DTN; wireless; information retrieval; Synthesis project;DOME

    [show/hide bibtex]

  •    
  • DTN Routing as a Resource Allocation Problem
    Aruna Balasubramanian, Brian Neil Levine, and Arun Venkataramani
    Proc. ACM SIGCOMM, pages 373–384. August 2007. [slides] [traces]
    keywords: DTN; routing; wireless;DOME

    [show/hide bibtex]

  •    
  • Bounding Damage From Link Destruction with Application to the Internet (extended abstract)
    George Bissias, Brian Neil Levine, and Arnold L. Rosenberg
    Proc. ACM SIGMETRICS, pages 367–-368. June 2007. [poster]
    keywords: security; routing

    [show/hide bibtex]

  •    
  • Threats to Privacy in the Forensic Analysis of Database Systems
    Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine
    Proc. ACM Intl Conf. on Management of Data (SIGMOD), pages 91–102. June 2007.
    keywords: forensics; database security; Privacy

    [show/hide bibtex]

  •    
  • An Energy-Efficient Architecture for DTN Throwboxes
    Nilanjan Banerjee, Mark D. Corner, and Brian Neil Levine
    Proceedings of IEEE Infocom, pages 776–784. May 2007. [slides] [techreport]
    keywords: Power Management; DTN; DOME

    [show/hide bibtex]

  •    
  • Cheat-Proof Playout for Centralized and Peer-to-Peer Gaming
    Nathaniel E. Baughman, Marc Liberatore, and Brian Neil Levine
    IEEE/ACM Transactions on Networking 15(1), pages 1–13. February 2007.
    keywords: security;gaming;peer-to-peer; Journal Paper

    [show/hide bibtex]

  •    
  • Informant: Detecting Sybils Using Incentives
    N. Boris Margolin and Brian Neil Levine
    Proc. Financial Cryptography and Data Security (FC), pages 192–207. February 2007. [presentation] [techreport]
    keywords: Sybil attack; peer-to-peer; anonymity

    [show/hide bibtex]

  •    
  • Securing History: Privacy and Accountability in Database Systems
    Gerome Miklau, Brian Neil Levine, and Patrick Stahlberg
    Biennial ACM/VLDB Conference on Innovative Data Systems Research (CIDR), pages 387–396. January 2007. [presentation]
    keywords: database security; forensics

    [show/hide bibtex]


  • 2006

       
  • Maximizing Transfer Opportunities in Bluetooth DTNs
    Marc Liberatore, Brian Neil Levine, and Chadi Barakat
    Proc. ACM Conference on Future Networking Technologies (CoNext), December 2006. [presentation]
    keywords: DTN; wireless; MAC Protocols; DOME

    [show/hide bibtex]

  •    
  • A Survey of Solutions to the Sybil Attack
    Brian Neil Levine, Clay Shields, and N. Boris Margolin
    Technical Report 2006-052, University of Massachusetts Amherst, October 2006.
    keywords: Sybil attack; peer-to-peer;security; anonymity

    [show/hide bibtex]

  •    
  • Inferring the Source of Encrypted HTTP Connections
    Marc Liberatore and Brian Neil Levine
    Proc. ACM conference on Computer and Communications Security (CCS), pages 255–263. October 2006. [slides] [traces]
    keywords: security; privacy; anonymity; forensics

    [show/hide bibtex]

  •    
  • Capacity Enhancement using Throwboxes in DTNs
    Wenrui Zhao, Yang Chen, Mostafa Ammar, Mark D. Corner, Brian Neil Levine, and Ellen Zegura
    Proceedings of IEEE International Conf on Mobile Ad hoc and Sensor Systems (MASS), pages 31-40. October 2006. [presentation]
    keywords: DTN; wireless; DOME

    [show/hide bibtex]

  •    
  • A Survey of Practical Issues in Underwater Networks
    James W. Partan, Jim Kurose, and Brian Neil Levine
    Proc. ACM International Workshop on UnderWater Networks (WUWNet), pages 17–24. September 2006. [presentation]
    keywords: DTN; underwater; wireless; DOME

    [show/hide bibtex]

  •    
  • Detecting the Sybil Attack in Ad hoc Networks
    Chris Piro, Clay Shields, and Brian Neil Levine
    Proc. IEEE/ACM International Conference on Security and Privacy in Communication Networks (SecureComm), pages 1–11. August 2006.
    keywords: security; Sybil attack; wireless

    [show/hide bibtex]

  •    
  • Autonomous Enhancement of Disruption Tolerant Networks
    Brendan Burns, Oliver Brock, and Brian Neil Levine
    Proc. IEEE International Conference on Robotics and Automation, pages 2105–2110. May 2006.
    keywords: DTN; wireless; routing; DOME

    [show/hide bibtex]

  •    
  • MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks (2017 Test of Time Award Winner)
    John Burgess, Brian Gallagher, David Jensen, and Brian Neil Levine
    Proc. IEEE INFOCOM, April 2006. [slides] [traces]
    keywords: DTN; wireless; routing; Synthesis project; DOME; Award Paper

    [show/hide bibtex]


  • 2005

       
  • On the Cost-Ineffectiveness of Redundancy in Commercial P2P Computing
    Matthew Yurkewych, Brian Neil Levine, and Arnold L. Rosenberg
    Proc. ACM Conference on Computer and Communications Security (CCS), pages 280–288. November 2005.
    keywords: security; peer-to-peer; Sybil attack; Synthesis project

    [show/hide bibtex]

  •    
  • Creating Social Networks to Improve Peer-to-Peer Networking
    Andrew Fast, David Jensen, and Brian Neil Levine
    Proc. ACM Intl. Conf. on Knowledge Discovery in Data Mining (KDD), pages 568–573. August 2005.
    keywords: peer-to-peer

    [show/hide bibtex]

  •    
  • Supporting P2P Gaming When Players Have Heterogeneous Resources
    Aaron {St. John} and Brian Neil Levine
    Proc. ACM Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), pages 1–6. June 2005.
    keywords: peer-to-peer; gaming

    [show/hide bibtex]

  •    
  • Privacy Vulnerabilities in Encrypted HTTP Streams
    George Bissias, Marc Liberatore, David Jensen, and Brian Neil Levine
    Proc. Privacy Enhancing Technologies Workshop (PET), pages 1–11. May 2005. [traces]
    keywords: security; anonymity; privacy

    [show/hide bibtex]

  •    
  • MV Routing and Capacity Building in Disruption Tolerant Networks
    Brendan Burns, Oliver Brock, and Brian Neil Levine
    Proc. IEEE INFOCOM, pages 398–408. March 2005.
    keywords: routing; DTN;wireless; Synthesis project; DOME

    [show/hide bibtex]

  •    
  • Authenticated Routing for Ad hoc Networks
    Kimaya Sanzgiri, Bridget Dahill, Daniel LaFlamme, Brian Neil Levine, Clay Shields, and Elizabeth Belding-Royer
    IEEE/ACM Journal of Selected Areas in Communications: Special issue on Wireless Ad hoc Networks (JSAC) 23(3), pages 598–610. March 2005.
    keywords: wireless; security; routing; Journal Paper

    [show/hide bibtex]

  •    
  • Distributed Information Retrieval For Disruption-Tolerant Mobile Networks
    Yun Zhou, Brian Neil Levine, and W. Bruce Croft
    Technical Report IR-412, University of Massachusetts Amherst, March 2005. [pdf]
    keywords: DTN; information retrieval; DOME

    [show/hide bibtex]


  • 2004

       
  • The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
    Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields
    ACM Transactions on Information and System Security (TISSEC) 4(7), pages 489–522. November 2004.
    keywords: anonymity; peer-to-peer; Journal Paper

    [show/hide bibtex]

  •    
  • Analysis of an Incentives-based Protection System
    N. Boris Margolin, Matthew Wright, and Brian Neil Levine
    Proc.~ACM Digital Rights Management Workshop (DRM), pages 22–30. October 2004. [presentation]
    keywords: security; Sybil attack

    [show/hide bibtex]

  •    
  • Information Sharing in Out-of-Hospital Disaster Response: The Future Role of Information Technology
    Jeffrey Arnold, Brian Neil Levine, R. Manmatha, F. Lee, Prashant Shenoy, M.-C. Tsai, T.K. Ibrahim, D. OBrien, and D.A. Walsh
    Journal of Prehospital and Disaster Medicine 19(3), pages 201–207. July 2004.
    keywords: wireless; peer-to-peer; DTN; Journal Paper; DOME

    [show/hide bibtex]

  •    
  • A Multi-agent Approach for Peer-to-Peer based Information Retrieval System
    Haizheng Zhang, W. Bruce Croft, Brian Neil Levine, and Victor Lesser
    Proc.~Intl. Joint Conf. on Autonomous Agents and MultiAgent Systems, pages 456–464. July 2004.
    keywords: peer-to-peer; Synthesis project; information retrieval

    [show/hide bibtex]

  •    
  • Exploring the Use of BitTorrent as the Basis for a Large Trace Repository
    Anthony Bellissimo, Prashant Shenoy, and Brian Neil Levine
    Technical Report 04-41, University of Massachusetts Amherst, June 2004. [tech report]
    keywords: peer-to-peer

    [show/hide bibtex]

  •    
  • An Evaluation of Chord Using Traces of Peer-to-Peer File Sharing (extended abstract)
    Jacky Chu, Kevin Labonte, and Brian Neil Levine
    Proc. ACM SIGMETRICS, pages 432–433. June 2004.
    keywords: peer-to-peer

    [show/hide bibtex]

  •    
  • SPIES: Secrets Protection Incentives-based Escrow System
    N. Boris Margolin, Matthew Wright, and Brian Neil Levine
    Proc.~ Workshop on the Economics of Peer-to-Peer Systems (p2pEcon), June 2004.
    keywords: security; Sybil attack

    [show/hide bibtex]

  •    
  • Surviving Attacks on DNS using Ubiquitous Replication
    Daniel LaFlamme and Brian Neil Levine
    Technical Report 04-11, University of Massachusetts Amherst, March 2004. [tech report]
    keywords: security; Tech report

    [show/hide bibtex]

  •    
  • Timing Attacks in Low-Latency Mix Systems
    Brian Neil Levine, Mike Reiter, Chenxi Wang, and Matthew Wright
    Proc. Financial Cryptography (FC) (LNCS 3110), pages 251–-265. February 2004.
    keywords: peer-to-peer; anonymity

    [show/hide bibtex]


  • 2003

       
  • Mobile Distributed Information Retrieval For Highly Partitioned Networks
    Katrina M. Hanna, Brian Neil Levine, and R. Manmatha
    Proc. IEEE Intl. Conference on Network Protocols (ICNP), pages 38–47. November 2003. [presentation]
    keywords: routing; DTN; wireless; Synthesis project; information retrieval; DOME

    [show/hide bibtex]

  •    
  • Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
    Brian Neil Levine, Sanjoy Paul, and J.J. Garcia-Luna-Aceves
    ACM/Springer Multimedia Systems Journal 9(1), pages 3–14. July 2003.
    keywords: multicast; Journal Paper

    [show/hide bibtex]

  •    
  • Defending Anonymous Communication Against Passive Logging Attacks
    Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields
    Proc. IEEE Symposium on Security and Privacy (Oakland), pages 28–41. May 2003.
    keywords: anonymity;peer-to-peer

    [show/hide bibtex]

  •    
  • Adaptive Peer Selection
    Daniel Bernstein, Zhengzhu Feng, Brian Neil Levine, and Shlomo Zilberstein
    Proc. Intl. Workshop on Peer-to-Peer Systems (IPTPS), pages 237–246. February 2003.
    keywords: peer-to-peer; Synthesis project

    [show/hide bibtex]


  • 2002

       
  • A Secure Routing Protocol for Ad hoc Networks
    Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth Belding-Royer
    Proc. of IEEE International Conference on Network Protocols (ICNP), pages 78–89. November 2002. [plagiarized]
    keywords: security; wireless; routing

    [show/hide bibtex]

  •    
  • Hordes --- A Multicast Based Protocol for Anonymity
    Brian Neil Levine and Clay Shields
    Journal of Computer Security 10(3), pages 213–240. September 2002.
    keywords: anonymity; multicast; peer-to-peer; Journal Paper

    [show/hide bibtex]

  •    
  • Availability and Locality Measurements of Peer-to-Peer File Systems
    Jacky Chu, Kevin Labonte, and Brian Neil Levine
    Proc. ITCom: Scalability and Traffic Control in IP Networks II Conference, pages 310–321. July 2002. [presentation]
    keywords: peer-to-peer

    [show/hide bibtex]

  •    
  • An Analysis of the Degradation of Anonymous Protocols
    Matthew Wright, Micah Adler, Brian Neil Levine, and Clay Shields
    Proc. ISOC Symposium Network and Distributed System Security (NDSS), pages 38–50. February 2002. [presentation]
    keywords: peer-to-peer; anonymity;award paper; Synthesis project

    [show/hide bibtex]


  • 2001

       
  • Evaluation of a Novel Two-Step Server Selection Metric
    Katrina M. Hanna, Nandini Natarajan, and Brian Neil Levine
    Proc. IEEE Intl. Conference on Network Protocols (ICNP), pages 290–300. November 2001.
    keywords: peer-to-peer

    [show/hide bibtex]

  •    
  • Responder Anonymity and Anonymous Peer-to-Peer File Sharing
    Vincent Scarlata, Brian Neil Levine, and Clay Shields
    Proc. IEEE International Conference on Network Protocols (ICNP), pages 272–280. November 2001.
    keywords: peer-to-peer; anonymity

    [show/hide bibtex]

  •    
  • Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks
    James Davis, Andy Fagg, and Brian Neil Levine
    Proc.~IEEE Intl. Symp on Wearable Computers (ISWC), pages 141–148. October 2001.
    keywords: wireless; DTN; routing; Synthesis project; DOME

    [show/hide bibtex]

  •    
  • Cheat-Proof Playout for Centralized and Distributed Online Games
    Nathaniel E. Baughman and Brian Neil Levine
    Proc. IEEE Infocom, pages 104–113. April 2001.
    keywords: peer-to-peer; gaming;security

    [show/hide bibtex]


  • 2000

       
  • A Protocol for Anonymous Communication Over the Internet
    Clay Shields and Brian Neil Levine
    Proc. ACM Conference on Computer and Communication Security (CCS), pages 33–43. November 2000.
    keywords: anonymity; multicast; peer-to-peer

    [show/hide bibtex]

  •    
  • A Hierarchical Multicast Monitoring Scheme
    Joerg Walz and Brian Neil Levine
    Proc.~Intl. Workshop on Networked Group Communication (NGC), pages 105–116. November 2000.
    keywords: multicast

    [show/hide bibtex]

  •    
  • Consideration of Receiver Interest for IP Multicast Delivery
    Brian Neil Levine, Jon Crowcroft, Christophe Diot, J.J. Garcia-Luna Aceves, and Jim Kurose
    Proc.~IEEE Infocom, pages 470–479. March 2000. [plagiarized]
    keywords: multicast

    [show/hide bibtex]

  •    
  • Deployment Issues for the IP Multicast Service and Architecture
    Christophe Diot, Brian Neil Levine, Bryan Lyles, H. Kassan, and D. Balsiefien
    IEEE Network: Special Issue on Multicasting 14(1), pages 78–88. January 2000.
    keywords: multicast; Journal Paper

    [show/hide bibtex]


  • 1999

       
  • 11: IP Multicast Routing
    Brian Neil Levine, Christophe Diot, and Christian Huitema
    Chapter in Routing in the Internet, pages 235–260. November 1999.
    keywords: multicast

    [show/hide bibtex]

  •    
  • Network Support for Group Communication
    Brian Neil Levine
    Ph.D. thesis, Computer Engineering, University of California, June 1999.
    keywords: multicast; routing; thesis

    [show/hide bibtex]


  • 1998

       
  • Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
    Brian Neil Levine, Sanjoy Paul, and J.J. Garcia-Luna-Aceves
    Proc. ACM Multimedia, pages 201–210. September 1998.
    keywords: multicast

    [show/hide bibtex]

  •    
  • A Comparison of Reliable Multicast Protocols
    Brian Neil Levine and J.J. Garcia-Luna-Aceves
    ACM/Springer Multimedia Systems Journal 6(5), pages 334–348. August 1998.
    keywords: multicast; Journal Paper

    [show/hide bibtex]


  • 1997

       
  • Improving Internet Multicast with Routing Labels
    Brian Neil Levine and J.J. Garcia-Luna-Aceves
    Proc.~IEEE International Conference on Network Protocols (ICNP), pages 241–50. October 1997.
    keywords: multicast; routing

    [show/hide bibtex]

  •    
  • 6: End-to-End Reliable Multicast
    J.J. Garcia-Luna-Aceves and Brian Neil Levine
    Chapter in Multimedia Communications: Protocols and Applications, pages 169–191. September 1997.
    keywords: multicast

    [show/hide bibtex]


  • 1996

       
  • The Case for Reliable Concurrent Multicasting Using Shared Ack Trees
    Brian Neil Levine, D. Lavo, and J.J. Garcia-Luna-Aceves
    Proc.~ACM Multimedia, pages 365–376. November 1996.
    keywords: multicast

    [show/hide bibtex]

  •    
  • A Comparison of Known Classes of Reliable Multicast Protocols
    Brian Neil Levine and J.J. Garcia-Luna-Aceves
    Proc.~IEEE International Conference on Network Protocols (ICNP), pages 112–121. October 1996.
    keywords: multicast

    [show/hide bibtex]

  •    
  • A Comparison of Known Classes of Reliable Multicast Protocols
    Brian Neil Levine
    Master's thesis, Computer Engineering, University of California, June 1996.
    keywords: multicast; thesis

    [show/hide bibtex]