Publications
A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004).
(2021).
(2021).
(2007).
Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium. 29-44.
(2004). The Top Speed of Flash Worms.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).
(2015). A Taxonomy of Computer Worms.
Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
(2003).
(2014). Stress Testing Cluster Bro.
Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
(2007). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007).
(2003).
(2020). Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention.
Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
(2007). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007).
(2011).
(2011). The SFRA: A Corner-Turn FPGA Architecture.
Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004). 3-12.
(2004). Securing Web Content.
7-12.
(2009). Risks of Cryptocurrencies.
Communications of the ACM. 61(6), 20-24.
(2018). Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
(2006). Reflections on Witty: Analyzing the Attacker.
;login: The USENIX Magazine. 29(3), 34-37.
(2004).
(2011).