Publications
Reflections on Witty: Analyzing the Attacker.
;login: The USENIX Magazine. 29(3), 34-37.
(2004). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium. 29-44.
(2004). The SFRA: A Corner-Turn FPGA Architecture.
Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004). 3-12.
(2004).
(2003). A Taxonomy of Computer Worms.
Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
(2003).
(2003).
(2000). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007).
(2009). Stress Testing Cluster Bro.
Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
(2007).
(2009).
(2009).
(2010).
(2010).
(2007).
(2011).
(2011). Here Be Web Proxies.
8362, 183-192.
(2014). Risks of Cryptocurrencies.
Communications of the ACM. 61(6), 20-24.
(2018).
(2021).
(2021).
(2021).