Publications
(2009).
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic.
Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005). 267-272.
(2005). Bro: A System for Detecting Network Intruders in Real-Time.
Proceedings of the 7th USENIX Security Symposium.
(1998). A Brief History of Scanning.
77-82.
(2007).
(2010). Blocking-resistant communication through domain fronting.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
(2015).
(2012). binpac: A yacc for Writing Application Protocol Parsers.
Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.
(2006).
(2015).
(2009). Automated Packet Trace Analysis of TCP Implementations.
Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
(1997). Automated Analysis of Cybercriminal Markets.
Proceedings of WWW 2017.
(2017).
(2011). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
1-7.
(2007). An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005). An Architecture for a Global Internet Host Distance Estimation Service.
Proceedings of IEEE INFOCOM.
(1999). An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of ACM Internet Measurement Conference.
(2016). An Analysis of China’s “Great Cannon”.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
(2015).
(2007).
(2012).
(2015). Active Mapping: Resisting NIDS Evasion Without Altering Traffic.
Proceedings of the IEEE Symposium on Security and Privacy.
(2003).
(2007).