Publications
(2010).
Pktd: A Packet Capture and Injection Daemon.
Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
(2003).
(2010). Practical Comprehensive Bounds on Surreptitious Communication Over DNS.
SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
(2013).
(2013). PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of ACM CCS.
(2016).
(2008).
(2010). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).
(2008). Profiling Underground Merchants Based on Network Behavior.
Proceedings of APWG eCrime 2016.
(2016). Protocol-Independent Adaptive Replay of Application Dialog.
Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
(2006).
(2012). A Reactive Measurement Framework.
92-101.
(2008).
(2011).
(2011). Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the International World Wide Web Conference.
(2016). Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
(2006). Robust TCP Reassembly in the Presence of Adversaries.
Proceedings of the 14th Conference on USENIX Security Symposium (Security '05). 65-80.
(2005). Scaling Phenomena in the Internet: Critically Examining Criticality.
Proceedings of National Academy of Science of the United States of America (PNAS). 99,
(2002).
(2009). Semi-Automated Discovery of Application Session Structure.
Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 119-132.
(2006).
(2011). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007). Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention.
Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
(2007).