|
Nicholas Weaver
International Computer Science Institute
2150 Shattuck Ave, Suite 250
Berkeley, CA, 94704
(510) 847-1675
nweaver@icsi.berkeley.edu
|
|
Education
-
Ph D, Computer Science, University of California at Berkeley
Completed October 15th, 2003. Degree Conferred December 2003
Dissertation Title: The SFRA: A Fixed Frequence FPGA Architecture
Committee: John Wawrzynek (chair), John Kubitowitz, and Steve Brenner
Dissertation: pdf
-
BA, Astrophysics and Computer Science, University of California at Berkeley
Degree Conferred Spring 1995
Publications
-
Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value
pdf
J Piet, J Fairoze, N Weaver. WEIS 2022
-
Cache Me Outside: A New Look at DNS Cache Probing
A Niaki, W Marczac, S Farhoodi, A McGregor, P Gill, N Weaver. PAM 2021
-
Cryptocurrency: Burn it with Fire
video
N. Weaver, USENIX Enigma 2019
-
The RISKs of Cryptocurrencies
pdf
N. Weaver, Communications of the ACM, June 2018
-
THe accuracy of the demographic inference shown on Google's Ad Settings
M Tschantz, S Egelman, J CHoi, N Weaver, G Friedland. 2018 Workshop on Privacy in the Electronic Society
-
Global Measurement of DNS Manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson. Usenix Security 2017
-
Autosonda: Discovering Rules and Triggers of Censorship Devices
J Jermyn, N Weaver, FOCI 2017
-
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations
J Chen, J Jiang, H. Duan, N. Weaver, T. Wan, V. Paxson. ACM CCS 2016
-
A Multi-perspective Analysis of Carrier-Grade NAT Deployment
P. Richter, F Wohlfart, N Vallina-Rodriquez, M. Allman, R. Bush, C. Kreibich, N. Weaver, V. Paxson, ACM Internet Measurement Conference 2016
-
Detecting DNS Root Manipulation
pdf
B. Jones, N. Feamster, V. Paxson, N. Weaver, and M. Allman, , Proc. Passive & Active Measurement: PAM-2016.
-
The Golden Age of Bulk Surveillance
video
N. Weaver, USENIX Enigma 2016
-
Stressing Out: Bitcoin "Stress Testing" pdf
K. Baqer, D. Huang, D. McCoy and N. Weaver. Financial Cryptography 2016 workshop on Bitcoin
-
Examining How the Great Firewall Discovers Hidden Circumvention Servers
pdf
R. Ensafi, D. Fifield, P. Winter, N. Feamster, N. Weaver, and V. Paxson. ACM Internet Measurement Conference 2015
-
Cookies Lack Integrity: Real-World Implications
web
X. Zheng, J. Jiang, J. Liang, H. Duan, S. Chen, T. Wan, and N. Weaver. Usenix Security 2015
-
An Analysis of China's "Great Cannon"
web
B. Marczak, N. Weaver, J. Dalek, R. Ensafi, D. Fifield, S. McKune, A. Rey, J. Scott-Railton, R. Deibert, and V. Paxson. FOCI 2015
-
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks
pdf
R. Rasti, M. Murthy, N. Weaver, and V. Paxson. IEEE Symposium on Security and Privacy 2015
-
Ethical Concerns for Censorship Measurement
pdf
B. Jones, R. Ensafi, N. Feamster, V. Paxson, and N. Weaver. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research, August 2015.
-
A Tangled Mass: The Android Root Certificate Stores
pdf
N. Vallina-Rodriguez, J. Amann, C. Kreibich, N. Weaver, and V. Paxson. ACM CoNEXT 2014 (Best Short Paper award)
-
The Matter of Heartbleed
pdf
Z. Durumeric, F. Li, J. Kasten, J. Amann, J. Beekman, M. Payer, N. Weaver, D. Adrian, V. Paxson, M. Bailey, and J. Halderman. Internet Measucement Conference 2014 (Best Paper award)
-
Botcoin: Monetizing Stolen Cycles> pdf
D. Huang, H. Dharmdasani, S. Meiklejohn, V. Dave, C. Grier, D. McCoy, S. Savage, N. Weaver, A. Snoeren, and K. Levchenko, NDSS 2014
-
Here Be Web Proxies
pdf
N. Weaver, C. Kreibich, M. Dam and V. Paxson, Passive & Active Mesaurement 2004
-
Internet Nameserver IPv4 and IPv6 Address Relationships
A. Berger, N. Weaver, R. Beverly, and L. Campbell
Internet Measurement Conference (IMC) 2013, Barcelona, Spain.
-
Practical Comprehensive Bounds on Surreptitious Communication Over DNS
V. Paxson, M. Christodorescu, M. Javed, J. Rao, R. Sailer, D. Schales, M. Stoecklin,
K. Thomas, W. Venema, and N. Weaver,
Usenix Security 2013, Washington, DC,
-
Fathom: A Browser-based Network Measurement Platform
M. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, V. Paxson. Internet Measurement Conference (IMC) 2012, Boston, MA, USA.
-
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. Voelker, S. Savage, K. Levchenko. USENIX Security Symposium, 2012, Bellevue/WA, USA.
-
Hold-On: Protecting Against DNS Packet Injection
H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson. Second Workshop on Securing and Trusting Internet Names (SATIN), 2012, Teddington, UK.
-
The BIZ Top-Level Domain: Ten Years Later
T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, V. Paxson. Passive and Active Measurement Conference, 2012, Vienna, Austria.
-
GQ: Practical Containment for Measuring Modern Malware Systems
C. Kreibich, N. Weaver, C. Kanich, W. Cui, V. Paxson. Internet Measurement Conference (IMC) 2011, Berlin, Germany.
-
Experiences from Netalyzr with Engaging Users in End-System Measurement
C. Kreibich, N. Weaver, G. Maier, B. Nechaev, V. Paxson. ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), 2011, Toronto, Canada.
-
Redirecting DNS for Ads and Profit
N. Weaver, C. Kreibich, V. Paxson. USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2011, San Francisco, USA.
-
Show Me the Money: Characterizing Spam-advertised Revenue
C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, S. Savage. USENIX Security Symposium, 2011, San Francisco, USA.
-
Click Trajectories: End-to-End Analysis of the Spam Value Chain
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. IEEE Symposium on Security and Privacy, 2011, Oakland, USA. Test of time award winner
-
Implications of Netalyzr's DNS Measurements
N. Weaver, C. Kreibich, B. Nechaev, V. Paxson. First Workshop on Securing and Trusting Internet Names (SATIN), 2011, Teddington, UK.
-
Netalyzr: Illuminating The Edge Network
C. Kreibich, N. Weaver, B. Nechaev, V. Paxson. Internet Measurement Conference (IMC), 2010, Melbourne, Australia. Test of time award winner
-
Botnet Judo: Fighting Spam with Itself
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, S. Savage. 17th Annual Network and Distributed System Security Symposium, 28 February - 3 March 2010, San Diego, USA.
-
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention
R. Sommer, V. Paxson, and N. Weaver.
Concurrency and Computation: Practice and Experience, Special Issue: Multi-core Supported Network and System Security, 21(10), pp. 1255-1279, May 2009.
-
Edge Caches Should be Free
N. Weaver. Tellecommunications Policy Research Conference (TPRC), September 2009
-
Detecting Forged TCP Reset Packets
N. Weaver, R. Sommer, and V. Paxson.
Network and Distributed Security Symposium (NDSS), February 2009
-
Principles for Developing Comprehensive Network Visibility
M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver. 3rd USENIX Workshop on Hot Topics in Security (HotSec '08), 29 July 2008, San Jose, USA.
-
Detecting In-Flight Page Changes with Web Tripwires
C. Reis, S. Gribble, T. Kohno, and N. Weaver. USENIX Symposium on Network Systems Design and Implementation (NSDI), April 2008.
-
Shunting: A Hardware/Software Architecture for Flexible, High-Pergformance Network Intrusion Prevention
J. Gonzalez, V. Paxson, and N. Weaver. ACM Communication and Computer Security (CCS), October 2007
-
The Strengths of Weaker Identities: Opportunistic Personas
M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver. Second USENIX Workshop on Hot Topics in Security (HotSec '07), 2007, Boston, USA.
-
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention
V. Paxson, R. Sommer, and N. Weaver. IEEE Sarnoff Symposium
-
The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention
N. Weaver, V. Paxson, and J. Gonzalez. ACM Symposium on Field Programmable Gate Arrays (FPGA). February 2007
-
Rethinking Hardware Support for Network Analysis and Intrusion Prevention
V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Somer, and N. Weaver. USENIX Workshop on Hot Topics in Security (HotSec), August 2006
-
Protocol-Independent Adaptive Replay of Application Dialog
W. Cui, V. Paxson, N. Weaver, and R. Katz, Network and Distributed Security Symposium (NDSS), February 2006
-
Exploting Unterlying Structure for Detailed Reconstruction of an Internet Scale Event
A. Kumar, V. Paxson, and N. Weaver, ACM Internet Measurement Conference (IMC), October 2005
Templace
-
The Top Speed of Flash Worms
S. Staniford, D. Moore, V. Paxson, and N. Weaver, 2nd ACM Workshop on Rapid Malcode (WORM), 2004
-
Preliminary Results Using Scale-Down to Explore Worm Dynamics
N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson, 2nd ACM Workshop on Rapid Malcode (WORM), 2004
Templace
-
Worms vs Perimeters: The Case for HardLANs
N. Weaver, D. Ellis, S. Staniford, and V. Paxson, Hot Interconnects, 2004
-
Reflections on the Witty Worm: Analyzing the Attacker
N. Weaver and D. Ellis. ;login:, June 2004
-
Very Fast Containment of Scanning Worms
N. Weaver, S. Staniford, and V. Paxson. USENIX Security Conference, 2004
-
A Worst-Case Worm
N. Weaver and V. Paxson. Workshop on Economics and Information Security (WEIS) 2004
-
The SFRA: A Corner-Turn FPGA Architecture
N. Weaver, J. Hauser, and J. Wawrzynek, ACM Symposium on Field Programmable Gate Arrays (FPGA), February 2004
-
A Taxonomy of Computer Worms
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. First Workshop on Rapid Malcode (WORM), 2003.
-
Inside the Slammer Worm
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. IEEE Magazine of Security and Privacy
-
Post Placement C-slow Retiming for the Xilinx Virtex FPGA
N. Weaver, Y. Markovskiy, Y. Patel, and J. Wawrzynek, ACM Symposium on Field Programmable Gate Arrays (FPGA). February 2003.
-
How to 0wn the Internet in Your Spare Time
V. Paxson, S. Staniford, and N. Weaver. USENIX Security Symposium, August 2002.
-
A Comparison of the AES Candidates Amenability to FPGA Implementation
N. Weaver and J. Wawrzynek. The Third Advanced Encryption Standard (AES) Candidate Conference, 2000
-
Object-Oriented Circuit Generators in Java
M. Chu, N. Weaver, J. Sulimma, A. DeHon, and J. Wawrzynek. IEEE Symposium on Field Programmable Custom Computing Machines (FCCM), 1998
Book Chapters
-
Very Fast Containment of Scanning Worms, Revisited
N. Weaver, S. Staniford, and V. Paxson. From Malware
Detection, edited by Mihai Christodorescu, Somesh Jha, Douglas
Maughan, Dawn Song, and Cliff Wang, Published by Springer/Verlag
Copyright 2007, ISBN 978-0-387-32720-4, Pages 113-145
-
Chapter 18: Retiming, Repipelining, and C-Slow Retiming
N. Weaver. From Reconfigurable Computing: The Theory and
Practice of FPGA-Based Computing, edited by Scott Hauck and Andre
DeHon, Published by Morgan Kaufmann/Elsevier. Copyright 2007, ISBN
978-0123705228, Pages 383-400
Posters
-
The Effect of Datapath Placement and C-Slow Retiming on Three Computational Benchmarks
N. Weaver and J. Wawrzynek, IEEE Symposium on Field Programmable Custom Computing Machines (FCCM), May 2002. Original paper in pdf
-
Corner Turning FPGA: Motivation and Routing
N. Weaver and J. Wawrzynek, 9th ACM Symposium on Field Programmable Gate Arrays (FPGA), February 2001. Original paper in pdf
Web Publishing and Technical Reports
The Death of Cryptocurrency: The Case for Regulation
N. Weaver, Yale Law School ISP Digital Future Whitepaper Series, December 2022
-
GQ: Realizing a System to Catch Worms in a Quarter Million Places
W. Cui, V. Paxson, and N. Weaver. ICSI Technical Report TR-06-004, September 2006
-
The Spread of the Sapphire/Slammer Worm
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford,
and N. Weaver. CAIDA Technical Report. A revised version
appeared in the August 2003 IEEE Magazine of Security and
Privacy.
-
Large Scale Malicious Code: A Research Agenda
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. DARPA sponsored report. 2003
-
A High Performance, Compact Rijndael (AES) Core for Virtex FPGAs
N. Weaver and J. Wawryznek.
-
Warhol Worms, the Potential for Very Fast Internet Plagues
N. Weaver
Selected Publications for Lay Audiences
Tutorials
-
Understanding and Adressing the Threat of Internet Worms
V. Paxson, S. Savage, G. Voelker, and N. Weaver, USENIX Security Conference, August 2006
-
The Worm and Virus Threat
D. Ellis and N. Weaver. Annual Computer Security Applications Conference (ACSAC), December 2003 and December 2004
Professional Activities
-
Program Co Chair
NPSec 2005
-
Program Committe Member
Usenix Security 2016
Internet Measurement Conference 2015
Tellecomunications Policy Research Conference (TPRC) 2012, 2013, 2014
Securing and Trusting Internet Names (SATIN) 2011, 2012
Network and Distributed Security Symposium (NDSS) 2005, 2006, 2008, 2009, 2010, 2011, 2012
Financial Crypto (FC) 2011
Communications and Computer Security (CCS) 2007, 2008
Cyber Security Experiment and Test (CSET) 2008
Field Programmable Logic (FPL) 2008
WWW Security Track 2008
ACNS 2008
CSAW 2007
Field Programmable Gate Arrays (FPGA) 2005
Teaching Experience
-
Instructor
Spring 2022, UC Berkeley, Computer Science 161: Computer Security
Spring 2022, UC Berkeley, Computer Science 61C: Great Ideas in Computer Architecture (Machine Structures)
Fall 2021, UC Berkeley, Computer Science 161: Computer Security
Fall 2021, UC Berkeley, Computer Science 61C: Great Ideas in Computer Architecture (Machine Structures)
Spring 2021, UC Berkeley, Computer Science 161: Computer Security
Spring 2021, UC Berkeley, Computer Science 61C: Great Ideas in Computer Architecture (Machine Structures)
Fall 2020, UC Berkeley, Computer Science 161: Computer Security
Spring 2020, UC Berkeley, Computer Science 61C: Great Ideas in Computer Architecture (Machine Structures)
Fall 2019, UC Berkeley, Computer Science 161: Computer Security
Spring 2019, UC Berkeley, Computer Science 161: Computer Security
Spring 2019, UC Berkeley, Computer Science 61C: Great Ideas in Computer Architecture (Machine Structures)
Fall 2018, UC Berkeley, Computer Science 161: Computer Security
Spring 2018, UC Berkeley, Computer Science 61C: Great Ideas in Computer Architecture (Machine Structures)
Spring 2018, UC Berkeley, EECS 151: Digital Design
Fall 2017, UC Berkeley, Computer Science 161: Computer Security
Spring 2017, UC Berkeley, Computer Science 61C: Great Ideas in Computer Architecture (Machine Structures)
Fall 2016, UC Berkeley, Computer Science 161: Computer Security
Spring 2016, UC Berkeley, Computer Science 194: Advanced topics in Networking
Spring 2016, UC Berkleey, Computer Science 61C: Great Ideas in Computer Architecture (Machine Structures)
Summer 1998, UC Berkeley, Computer Science 61C: Machine Structures
Fall 1997, UC Berkeley, Computer Science 198: Special Topics, A Survey of Computer Science
Professional Experience
-
International Computer Science Institute
Graduate Student Researcher (September 2003 to October
2003), Postdoctoral/Staff Researcher (November 2003-present).
Developing techniques to simulate, analyze, detect, and respond to
worms, network attacks, network security, network measurement, and
related issues.
-
Skerry Technologies
Chief Mad Scientist (May 2022-present) Developing
technologies for small, human safe, low cost, and fully
autonomous sUAS (Small Unmanned Aerial Systems, aka drones).
-
University of California at Davis
Lecturer in Computer Science. Fall 2023 to present
-
-
University of California at Berkeley
Lecturer in Computer Science. Spring 2016-Spring 2022. Classes taught: Computer Science 61C (Machine Structures), Computer Science 194 (Practical Networking). Computer Science 161 (Computer Security)
-
UC San Diego
(January 2012 - December 2013). Visiting Researcher. Developing techniques to simulate, analyze, detect, and respond to worms, network attacks, network security, and related issues.
-
UC Berkeley
(January 2010 - December 2011, January 2014 - June 2015). Visiting Researcher. Developing techniques to simulate, analyze, detect, and respond to worms, network attacks, network security, and related issues.
-
Silicon Defense
Summer 2002 to February 2003 (part time). Researcher, developing techniques to counter worms and other forms of widespread malicious code.
-
Lawrence Berkeley Laboratory
Summer 1994. Summer Student, developing parallel implementations and visualization tools for DNA and Protein Sequence Matching.
|
|
|