Publications
(2010).
(2003).
(2010).
(2003).
(2010).
(2011).
(2009).
(2014).
(2003).
(2010).
(2000).
Reflections on Witty: Analyzing the Attacker.
;login: The USENIX Magazine. 29(3), 34-37.
(2004). Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009). A Worst-Case Worm.
Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
(2004). Worms vs. Perimeters: The Case for Hard-LANs.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
(2004). Very Fast Containment of Scanning Worms.
Proceedings of the 13th USENIX Security Symposium. 29-44.
(2004). The Top Speed of Flash Worms.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004).
(2015). A Taxonomy of Computer Worms.
Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
(2003).
(2014). Stress Testing Cluster Bro.
Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
(2007). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention.
Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
(2007). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007).