Formally verifying protocols from textual specifications
Guest Post: A data-driven approach for extracting Finite State Machines from RFCs.
Guest Post: A data-driven approach for extracting Finite State Machines from RFCs.
Guest Post: Learn how TCP Middlebox Reflection attacks work and what are the best current practices for defending against it.
Guest Post: Learn how a new open-source gRPC dial-out collector is helping one ISP add more data streams to its telemetry solution.
Guest Post: Study shows that despite progress in routing security, there’s still a lot of work to be done.
Measuring the robustness of IPv6 extension headers.
Guest Post: Taurus bridges the gap between speed and intelligence by running machine-learning models directly in the network on every packet.
Guest Post: GPS is an open-source scanning system that predicts IPv4 services across all ports in less than 48 hours.
Guest Post: Annual report sheds light on critical nature of certain Autonomous Systems and how their outage might affect the connectivity of an economy.
Guest Post: How much unwanted traffic is out there, and how much is too much to allow out of a source network?
Guest Post: Modelling a complex graph from PeeringDB to characterize the key Internet peering players and their interactions over time.