OpenBox: A software-defined framework for developing, deploying, and managing network functions A Bremler-Barr, Y Harchol, D Hay Proceedings of the 2016 ACM SIGCOMM Conference, 511-524, 2016 | 233 | 2016 |
Deep packet inspection as a service A Bremler-Barr, Y Harchol, D Hay, Y Koral Proceedings of the 10th ACM International on Conference on emerging …, 2014 | 187 | 2014 |
Enabling a permanent revolution in internet architecture J McCauley, Y Harchol, A Panda, B Raghavan, S Shenker Proceedings of the ACM Special Interest Group on Data Communication, 1-14, 2019 | 73 | 2019 |
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications A Bremler-Barr, Y Harchol, D Hay, Y Hel-Or Symposium on Parallelism in Algorithms and Architectures (SPAA), 35-46, 2016 | 32 | 2016 |
Openbox: Enabling innovation in middlebox applications A Bremler-Barr, Y Harchol, D Hay Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes …, 2015 | 29 | 2015 |
Space-time tradeoffs in software-based deep packet inspection A Bremler-Barr, Y Harchol, D Hay 2011 IEEE 12th International Conference on High Performance Switching and …, 2011 | 28 | 2011 |
Granular computing and network intensive applications: Friends or foes? A Singhvi, S Banerjee, Y Harchol, A Akella, M Peek, P Rydin Proceedings of the 16th ACM Workshop on Hot Topics in Networks, 157-163, 2017 | 27 | 2017 |
Cessna: Resilient edge-computing Y Harchol, A Mushtaq, J McCauley, A Panda, S Shenker Proceedings of the 2018 workshop on mobile edge communications, 1-6, 2018 | 21 | 2018 |
Distributed SSH key management with proactive RSA threshold signatures Y Harchol, I Abraham, B Pinkas Applied Cryptography and Network Security: 16th International Conference …, 2018 | 21 | 2018 |
Making DPI engines resilient to algorithmic complexity attacks Y Afek, A Bremler-Barr, Y Harchol, D Hay, Y Koral IEEE/ACM Transactions on Networking 24 (6), 3262-3275, 2016 | 21 | 2016 |
Ultra-fast similarity search using ternary content addressable memory A Bremler-Barr, Y Harchol, D Hay, Y Hel-Or Proceedings of the 11th International Workshop on Data Management on New …, 2015 | 21 | 2015 |
Methods and systems that efficiently and securely store encryption keys A Kariv, I Abraham, Y Harchol US Patent 11,070,374, 2021 | 20 | 2021 |
FTvNF: Fault tolerant virtual network functions Y Harchol, D Hay, T Orenstein Proceedings of the 2018 Symposium on Architectures for Networking and …, 2018 | 14 | 2018 |
MCA2 multi-core architecture for mitigating complexity attacks Y Afek, A Bremler-Barr, Y Harchol, D Hay, Y Koral Proceedings of the eighth ACM/IEEE symposium on Architectures for networking …, 2012 | 14 | 2012 |
Making edge-computing resilient Y Harchol, A Mushtaq, V Fang, J McCauley, A Panda, S Shenker Proceedings of the 11th ACM Symposium on Cloud Computing, 253-266, 2020 | 13 | 2020 |
Leveraging traffic repetitions for high-speed deep packet inspection A Bremler-Barr, ST David, Y Harchol, D Hay 2015 IEEE Conference on Computer Communications (INFOCOM), 2578-2586, 2015 | 13 | 2015 |
A public option for the core Y Harchol, D Bergemann, N Feamster, E Friedman, A Krishnamurthy, ... Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 12 | 2020 |
Method and system for providing deep packet inspection as a service D Hay, Y Koral, Y Harchol, A Brembler-barr US Patent 10,541,970, 2020 | 9 | 2020 |
Methods and systems that efficiently and securely store data A Kariv, I Abraham, Y Harchol US Patent 11,057,209, 2021 | 3 | 2021 |
Making edge-computing resilient Y Harchol, A Mushtaq, V Fang, J McCauley, A Panda, S Shenker Master’s thesis. EECS Department, University of California, Berkeley, 2019 | 2 | 2019 |