Publications
Protocol-Independent Adaptive Replay of Application Dialog.
Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
(2006).
(2008). Preliminary Results Using ScaleDown to Explore Worm Dynamics.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004). Practical Comprehensive Bounds on Surreptitious Communication Over DNS.
SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
(2013).
(2013).
(2003).
(2012).
(2009). Object Oriented Circuit Generators in Java.
Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM).
(1998). Netalyzr: Illuminating The Edge Network.
246-259.
(2010).
(2010). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2016).
(2021).
(2010).
(2014). Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.
(2003).
(2011).
(2021).
How to Own the Internet in Your Spare Time.
Proceedings of the Eleventh USENIX Security Symposium (Security '02).
(2002).
(2021).
(2020). Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of ACM CCS.
(2016).
(2012).