Consistency Analysis in Bloom: a CALM and Collected Approach. P Alvaro, N Conway, JM Hellerstein, WR Marczak CIDR, 249-260, 2011 | 270 | 2011 |
Dedalus: Datalog in Time and Space P Alvaro, WR Marczak, N Conway, JM Hellerstein, D Maier, R Sears Datalog Reloaded: First International Workshop, Datalog 2010, Oxford, UK …, 2011 | 193 | 2011 |
Logic and lattices for distributed programming N Conway, WR Marczak, P Alvaro, JM Hellerstein, D Maier Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012 | 162 | 2012 |
China’s great cannon B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ... Citizen Lab 10, 2015 | 102* | 2015 |
An Analysis of {China’s}{“Great}{Cannon”} B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ... 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015 | 99 | 2015 |
Hide and seek: Tracking NSO group’s Pegasus spyware to operations in 45 countries B Marczak, J Scott-Railton, S McKune, B Abdul Razzak, R Deibert | 95 | 2018 |
When governments hack opponents: A look at actors and technology WR Marczak, J Scott-Railton, M Marquis-Boire, V Paxson 23rd USENIX Security Symposium (USENIX Security 14), 511-525, 2014 | 89 | 2014 |
How Great is the Great Firewall? Measuring China's {DNS} Censorship NP Hoang, AA Niaki, J Dalek, J Knockel, P Lin, B Marczak, ... 30th USENIX Security Symposium (USENIX Security 21), 3381-3398, 2021 | 68 | 2021 |
The million dollar dissident: NSO group’s iPhone zero-days used against a UAE human rights defender B Marczak, J Scott-Railton Citizen Lab 24, 2016 | 55 | 2016 |
Towards a data-centric view of cloud security W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee Proceedings of the second international workshop on Cloud data management, 25-32, 2010 | 43 | 2010 |
A³: An Extensible Platform for Application-Aware Anonymity M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze | 41 | 2010 |
For their eyes only M Marquis-Boire Citizen Lab, Munk Centre for International Studies, University of Toronto, 2013 | 40 | 2013 |
Move fast and roll your own crypto: A quick look at the confidentiality of zoom meetings B Marczak, J Scott-Railton The Citizen Lab 3, 2020 | 38 | 2020 |
Secureblox: customizable secure distributed data processing WR Marczak, SS Huang, M Bravenboer, M Sherr, BT Loo, M Aref Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010 | 31 | 2010 |
Reckless exploit: Mexican journalists, lawyers, and a child targeted with NSO spyware J Scott-Railton, B Marczak, B Abdul Razzak, M Crete-Nishihata, R Deibert | 30 | 2017 |
You only click twice: FinFisher’s global proliferation M Marquis-Boire, B Marzcak, C Guarnieri, J Scott-Railton | 28 | 2013 |
The kingdom came to Canada: How Saudi-linked digital espionage reached Canadian soil B Marczak, J Scott-Railton, A Senft, B Abdul Razzak, R Deibert | 27 | 2018 |
Social engineering attacks on government opponents: Target perspectives WR Marczak, V Paxson Proceedings on privacy enhancing technologies, 2017 | 26 | 2017 |
The great ipwn: Journalists hacked with suspected nso group imessage ‘zero-click’exploit B Marczak, J Scott-Railton, N Al-Jizawi, S Anstis, R Deibert | 24 | 2020 |
Champing at the cyberbit: Ethiopian dissidents targeted with new commercial spyware B Marczak, G Alexander, S McKune, J Scott-Railton, R Deibert | 24 | 2017 |