Understanding the Mirai Botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... | 2494 | 2017 |
The matter of heartbleed Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ... Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014 | 1058 | 2014 |
Automated classification and analysis of internet malware M Bailey, J Oberheide, J Andersen, ZM Mao, F Jahanian, J Nazario International Workshop on Recent Advances in Intrusion Detection, 178-197, 2007 | 880 | 2007 |
A search engine backed by Internet-wide scanning Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 588 | 2015 |
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware X Chen, J Andersen, ZM Mao, M Bailey, J Nazario 2008 IEEE International Conference on Dependable Systems & Networks With …, 2008 | 500 | 2008 |
Analysis of the HTTPS certificate ecosystem Z Durumeric, J Kasten, M Bailey, JA Halderman Proceedings of the 2013 conference on Internet measurement conference, 291-304, 2013 | 424 | 2013 |
The Internet Motion Sensor-A Distributed Blackhole Monitoring System. M Bailey, E Cooke, F Jahanian, J Nazario, D Watson NDSS, 2005 | 396 | 2005 |
Bohatei: Flexible and Elastic DDoS Defense. SK Fayaz, Y Tobioka, V Sekar, M Bailey USENIX Security Symposium, 817-832, 2015 | 360 | 2015 |
A survey of botnet technology and defenses M Bailey, E Cooke, F Jahanian, Y Xu, M Karir 2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009 | 349 | 2009 |
An exploration of L2 cache covert channels in virtualized environments Y Xu, M Bailey, F Jahanian, K Joshi, M Hiltunen, R Schlichting Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 29-40, 2011 | 335 | 2011 |
Bobtail: Avoiding Long Tails in the Cloud. Y Xu, Z Musgrave, B Noble, M Bailey NSDI 13, 329-342, 2013 | 294 | 2013 |
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu USENIX Security Symposium, 1009-1024, 2015 | 245 | 2015 |
An Internet-Wide View of Internet-Wide Scanning. Z Durumeric, M Bailey, JA Halderman USENIX Security Symposium, 65-78, 2014 | 236 | 2014 |
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks J Czyz, M Kallitsis, M Gharaibeh, C Papadopoulos, M Bailey, M Karir Proceedings of the 2014 Conference on Internet Measurement Conference, 435-448, 2014 | 226 | 2014 |
Skill Squatting Attacks on Amazon Alexa D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ... 27th USENIX Security Symposium (USENIX Security '18), 2018 | 220 | 2018 |
The Security Impact of HTTPS Interception Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ... Network and Distributed Systems Symposium (NDSS’17), 2017 | 204 | 2017 |
Internet background radiation revisited E Wustrow, M Karir, M Bailey, F Jahanian, G Huston Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010 | 204 | 2010 |
Measuring ipv6 adoption J Czyz, M Allman, J Zhang, S Iekel-Johnson, E Osterweil, M Bailey Proceedings of the 2015 ACM SIGCOMM Conference, 2015 | 198 | 2015 |
Measuring Ethereum Network Peers SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey Proceedings of the Internet Measurement Conference 2018, 91-104, 2018 | 194 | 2018 |
Shades of Grey: On the effectiveness of reputation-based “blacklists” S Sinha, M Bailey, F Jahanian 2008 3rd International Conference on Malicious and Unwanted Software …, 2008 | 193 | 2008 |