Marc Liberatore
Marc Liberatore
Home
Contact
Teaching
Service
Posts
Publications
CV
Light
Dark
Automatic
Publications
Type
Date
2020
2019
2017
2016
2015
2014
2013
2012
2011
2010
2009
2007
2006
2005
Statistical Detection of Downloaders in Freenet
The creation and distribution of child sexual abuse materials (CSAM) involves a continuing violation of the victims’ privacy …
Brian Neil Levine
,
Marc Liberatore
,
Brian Lynn
,
Matthew Wright
Server-side traffic analysis reveals mobile location information over the Internet
Users can attempt to thwart third-party services from discovering their location by disabling location services on their mobile device. …
Keen Yuun Sung
,
Joydeep Biswas
,
Erik G. Learned-Miller
,
Brian Neil Levine
,
Marc Liberatore
Forensic Identification of Anonymous Sources in OneSwarm
OneSwarm is a p2p system for anonymous file sharing. We quantify the system’s vulnerability to three attacks that identify the …
George Bissias
,
Brian Neil Levine
,
Marc Liberatore
,
Swagatika Prusty
PDF
Statistical Detection of Downloaders in Freenet
Images posted to file-sharing networks without a person’s permission can remain available indefinitely. When the image is …
Brian Neil Levine
,
Marc Liberatore
,
Brian Lynn
,
Matthew Wright
PDF
Innovation with Scale
Being an effective teacher is challenging; to do so when your enrollment doubles or triples can be overwhelming. To teach at scale …
Michelle Trim
,
Neena Thota
,
Marc Liberatore
,
Tim Richards
,
Gordon Anderson
,
William T. Verts
Characterization of Contact Offenders and Child Exploitation Material Trafficking on Five Peer-to-Peer Networks
We provide detailed measurement of the illegal trade in child exploitation material (CEM, also known as child pornography) from …
George Bissias
,
Brian Neil Levine
,
Marc Liberatore
,
Brian Lynn
,
Juston Moore
,
Hanna Wallach
,
Janis Wolak
PDF
Discovering Specification Violations in Networked Software Systems
Publicly released software implementations of network protocols often have bugs that arise from latent specification violations. We …
Robert J. Walls
,
Yuriy Brun
,
Marc Liberatore
,
Brian Neil Levine
PDF
Sybil-Resistant Mixing for Bitcoin
A fundamental limitation of Bitcoin and its variants is that the movement of coin between addresses can be observed by examining the …
George Bissias
,
A. Pinar Ozisik
,
Brian N. Levine
,
Marc Liberatore
PDF
Slides
Efficient Tagging of Remote Peers During Child Pornography Investigations
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various …
Marc Liberatore
,
Brian Neil Levine
,
Clay Shields
,
Brian Lynn
PDF
Location Privacy without Carrier Cooperation
Cellular network operators can track the location of cell phone users as they connect to different towers. Operators may not directly …
Keen Sung
,
Brian Neil Levine
,
Marc Liberatore
PDF
Slides
Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network
We used data gathered via investigative “RoundUp” software to measure a year of online child pornography (CP) trafficking activity by …
Janis Wolak
,
Marc Liberatore
,
Brian Neil Levine
PDF
Turning Off GPS is Not Enough: Cellular location leaks over the Internet
Many third parties desire to discover and disclose your location with the help of your cell phone. Using an embedded GPS, phone …
Hamed Soroush
,
Keen Sung
,
Erik Learned-Miller
,
Brian Neil Levine
,
Marc Liberatore
PDF
Measurement and Analysis of Child Pornography Trafficking on P2P Networks (Runner-Up, Best Paper Award)
Peer-to-peer networks are the most popular mechanism for the criminal acquisition and distribution of child pornography (CP). In this …
Ryan Hurley
,
Swagatika Prusty
,
Hamed Soroush
,
Robert J. Walls
,
Jeannie Albrecht
,
Emmanuel Cecchet
,
Brian Neil Levine
,
Marc Liberatore
,
Brian Lynn
,
Janis Wolak
PDF
Slides
Effectiveness and Detection of Denial-of-Service Attacks in Tor
Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a …
Norman Danner
,
Sam Defabbia-Kane
,
Danny Krizanc
,
Marc Liberatore
PDF
Forensic Investigation of the OneSwarm Anonymous Filesharing System
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and …
Swagatika Prusty
,
Brian Neil Levine
,
Marc Liberatore
PDF
Slides
Effective Digital Forensics Research is Investigator-Centric
Many technical mechanisms across computer security for attribution, identification, and classification are neither sufficient nor …
Robert J. Walls
,
Brian Neil Levine
,
Marc Liberatore
,
Clay Shields
PDF
Slides
Video
Empirical Tests of Anonymous Voice Over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many …
Marc Liberatore
,
Bikas Gurung
,
Brian Neil Levine
,
Matthew Wright
PDF
Strengthening Forensic Investigations of Child Pornography on P2P Networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various …
Marc Liberatore
,
Brian Neil Levine
,
Clay Shields
PDF
Slides
Forensic Investigation of Peer-to-Peer File Sharing Networks
The investigation of peer-to-peer (p2p) file sharing networks is now of critical interest to law enforcement. P2P networks are …
Marc Liberatore
,
Robert Erdely
,
Thomas Kerle
,
Brian Neil Levine
,
Clay Shields
PDF
DEX: Digital Evidence Provenance Supporting Reproducibility and Comparison
The current standard and open formats for forensic data describe whole disk and memory image properties, but do not describe the …
Brian Neil Levine
,
Marc Liberatore
PDF
Code
Detecting Denial of Service Attacks in Tor
Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a …
Norman Danner
,
Danny Krizanc
,
Marc Liberatore
PDF
Cheat-Proof Playout for Centralized and Peer-to-Peer Gaming
We explore exploits possible for cheating in real-time, multiplayer games for both client-server and serverless architectures. We offer …
Nathaniel E. Baughman
,
Marc Liberatore
,
Brian Neil Levine
PDF
Maximizing Transfer Opportunities in Bluetooth DTNs
Devices in disruption tolerant networks (DTNs) must be able to communicate robustly in the face of short and infrequent connection …
Marc Liberatore
,
Brian Neil Levine
,
Chadi Barakat
PDF
Slides
Inferring the Source of Encrypted HTTP Connections
We examine the effectiveness of two traffic analysis techniques for identifying encrypted HTTP streams. The techniques are based upon …
Marc Liberatore
,
Brian Neil Levine
PDF
Dataset
Slides
Privacy Vulnerabilities in Encrypted HTTP Streams
Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic …
George Bissias
,
Marc Liberatore
,
David Jensen
,
Brian Neil Levine
PDF
Dataset
Cite
×