Publications

  • Intent-driven Composition of Resource-management SDN Applications.
    Victor Heorhiadi, Sanjay Chandrasekaran, Michael K. Reiter, and Vyas Sekar.
    In Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '18. New York, NY, USA, 2018. ACM. doi:10.1145/3281411.3281431.
    PDF ]

  • Gremlin: Systematic Resilience Testing of Microservices.
    Victor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, and Vyas Sekar.
    In Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, ICDCS'16. June 2016.
    PDF ]

  • Simplifying Software-Defined Network Optimization Using SOL.
    Victor Heorhiadi, Michael K. Reiter, and Vyas Sekar.
    In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI'16. March 2016.
    PDF ]

  • Accelerating the Development of Software-Defined Network Optimization Applications Using SOL.
    Victor Heorhiadi, Michael K. Reiter, and Vyas Sekar.
    Technical Report, arXiv preprint, April 2015.
    PDF ]

  • Hijacking the Vuze BitTorrent network: all your hop are belong to us.
    Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim.
    IET Information Security, 2014.
    PDF ]

  • SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading.
    Victor Heorhiadi, Seyed K. Fayaz, Michael K. Reiter, and Vyas Sekar.
    In Proceedings of the 10th International Conference on Information Systems Security, ICISS'14. December 2014.
    PDF ]

  • An Epidemiological Study of Malware Encounters in a Large Enterprise.
    Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, and Ari Juels.
    In Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS'14. November 2014.
    PDF ]

  • Balancing Computation-Communication Tradeoffs in Scaling Network-Wide Intrusion Detection Systems.
    Victor Heorhiadi, Michael K. Reiter, and Vyas Sekar.
    Technical Report, University of North Carolina Chapel Hill, 2012.
    PDF ]

  • New opportunities for load balancing in network-wide intrusion detection systems.
    Victor Heorhiadi, Michael K. Reiter, and Vyas Sekar.
    In Proceedings of the 8th international Conference on Emerging networking experiments and technologies, CoNeXT'12. December 2012.
    PDF ]

  • One-Way Indexing for Plausible Deniability in Censorship Resistant Storage.
    Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim.
    In Proceedings of the 2nd Usenix Workshop on Free and Open Communications on the Internet, FOCI'12. August 2012.
    PDF ]

  • The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems.
    Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim.
    ACM Transactions on Information and System Security, November 2011.
    PDF ]

  • Censorship resistant overlay publishing.
    Eugene Y. Vasserman, Victor Heorhiadi, Yongdae Kim, and Nicholas Hopper.
    Technical Report, University of Minnesota, 2011.
    PDF ]

  • Balancing the shadows.
    Max Schucard, Alexander W. Dean, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim.
    In Proceedings of the 9th annual ACM Workshop on Privacy in the Electronic Society, WPES '10. October 2010.
    PDF ]