1. Yehuda Afek , Anat Bremler-Barr , Yotam Harchol , David Hay , and Yaron Koral . MCA2 : Multi-Core Architecture for Mitigating Complexity Attacks . In Proceedings of the Eighth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS '12 , page 235 -- 246 , New York, NY, USA , 2012 . Association for Computing Machinery. Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, and Yaron Koral. MCA2: Multi-Core Architecture for Mitigating Complexity Attacks. In Proceedings of the Eighth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS '12, page 235--246, New York, NY, USA, 2012. Association for Computing Machinery.
2. Albert Gran Alcoz , Alexander Dietmüller , and Laurent Vanbever. SP-PIFO: Approximating Push-in First-out Behaviors Using Strict-Priority Queues. In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, NSDI '20 , page 59 -- 76 , USA, 2020 . USENIX Association. Albert Gran Alcoz, Alexander Dietmüller, and Laurent Vanbever. SP-PIFO: Approximating Push-in First-out Behaviors Using Strict-Priority Queues. In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, NSDI '20, page 59--76, USA, 2020. USENIX Association.
3. Noa Bar-Yosef and Avishai Wool . Remote Algorithmic Complexity Attacks against Randomized Hash Tables . In Joaquim Filipe and Mohammad S. Obaidat, editors, E-business and Telecommunications , pages 162 -- 174 , Berlin, Heidelberg , 2009 . Springer Berlin Heidelberg . Noa Bar-Yosef and Avishai Wool. Remote Algorithmic Complexity Attacks against Randomized Hash Tables. In Joaquim Filipe and Mohammad S. Obaidat, editors, E-business and Telecommunications, pages 162--174, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg.
4. Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
5. On making TCP more robust to packet reordering