ICSI, 1947 Center St., Suite 600,
Berkeley CA 94704
I received my Diplom in Computer Science
from TUM in 2002.
I then completed the Ph.D. program at the University of Cambridge
Computer Laboratory. There, I was one of the brains
Jon Crowcroft, my supervisor and pub coach.
In 2006 I moved on to ICSI's Networking and Security
group, where I am a senior research scientist. My
research focuses on topics in network monitoring,
distributed systems, and network security.
As of late 2012 I'm also the Director of Research
Inc, and currently serve on
the OISF's board of
I'm German, though they say I have a sense of humor.
Conferences & Workshops
Chairing and other organizational work:
CoNEXT 2012, Travel Grant Chair
DIMVA 2010, PC Chair
RAID 2010, Publications Chair
SIGCOMM 2015, Travel Grant Co-Chair
SPW 2012, Treasurer & Registr. Chair
TMA 2013, Co-Chair
DIMVA Steering Committee
SPW Steering Committee
More papers, including forthcoming work.
A Multi-perspective Analysis of Carrier-Grade NAT Deployment
P. Richter, F. Wohlfart, N. Vallina-Rodriguez, M. Allman, R. Bush, A. Feldmann, C. Kreibich, N. Weaver, and V. Paxson. IMC 2016, Santa Monica, CA, USA.
RevProbe: Detecting Silent Reverse Proxies in Malicious Server Infrastructures
A. Nappa, R.F. Munir, I.K. Tanoli, C. Kreibich, and J. Caballero. ACSAC 2016, Los Angeles, CA, USA.
Header Enrichment or ISP Enrichment: Emerging Privacy Threats in Mobile Networks
N. Vallina-Rodriguez, C. Kreibich, V. Paxson, S. Sundaresan. HotMiddlebox 2015, London, UK.
Beyond the Radio: Illuminating the Higher Layers of Mobile Networks
N. Vallina-Rodriguez, S. Sundaresan, C. Kreibich, N. Weaver, and V. Paxson. MobiSys 2015, Florence, Italy.
A Tangled Mass: The Android Root Certificate Stores
N. Vallina-Rodriguez, J. Amann, C. Kreibich, N. Weaver, and V. Paxson. ACM CoNEXT 2014, Sydney, Australia.
Best short paper award.
Haystack » understand your mobile device's traffic (Android app)
Netalyzr » debug your internet (Android app)
Fathom » turn your browser into a measurement platform
Priv3 » practical third-party privacy for the social web
Click Trajectories » end-to-end analysis of the spam value chain
Spamalytics » measuring spam conversion
Bro » ultra-flexible traffic analysis
CCIED » fighting internet epidemics
Honeycomb » automatic signature generation
Interviews, press coverage, etc.
How to ask for datasets
A conference travel grants HOWTO (for grad students)
How spam works » a real-world spam transaction
Browser use over the course of a day
Rich Stevens' sock program
libstree » generic suffix trees
Netdude » pluggable trace manipulation
Broccoli » let Bro talk to anything
cache.h » an STL-style cache (painful!)
A parser for Google Scholar