If you are thinking about becoming a
graduate student at UIUC, but are not yet admitted/enrolled, please
read this note.
About Me
If you are interested in what I have done professionally, you are welcome to read
my CV.
If you want more information about my group, please check out
the Network & Security
Research Group website. I am also part of a much larger cohort of
faculty, staff, and students that do great work in this domain called
the Security and
Privacy Research Group at Illinois (SPR@I)
Teaching
I have taught a variety of systems classes including Operating
Systems, Networking, Distributed Systems, and Security. Recent classes
include:
- Spring 2018, ECE 422 Computer Security I,
Course Website
- Spring 2018, ECE 391 Computer Systems Engineering,
Course Website
- Fall 2017, ECE 391 Computer Systems Engineering,
Course Website
- Spring 2017, ECE 422 Computer Security I,
Course Website
- Fall 2016, ECE 422 Computer Security I,
Course Website
- Spring 2016, ECE 422 Computer Security I,
Course Website
- Fall 2015, ECE 422 Computer Security I,
Course Website
- Spring 2015, ECE 422 Computer Security I,
Course Website
- Fall 2014, ECE 391 Computer Systems Engineering,
Course Website
Students
I am grateful to work with a great cadre of scientists, postdocs, and students:
Research
My interets lie in exploring the security, performance, and
availability properties of computing systems. My work seeks to both
inform the development of these systems to address immediate,
important societal problems as well as to fundementially enhance our
understanding of the sciences underlying computing subfields including
computer systems organization, networks, and security and privacy.
This work is accomplished (primarily) under the following contracts:
- TWC: TTP Option: Large: Collaborative: Internet-Wide
Vulnerability Measurement, Assessment, and Notification (National
Science Foundation, CNS 1518741)
When our work requires IRB approval, we list the submissions and approvals here:
At UIUC we are periodically required to complete the Collaborative
Institutional Training Initiative (CITI Program). My most recent
Coursework Requirements Report can be found
here.
Papers
(my Google Scholar Citations)
-
Seoung Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller,
and Michael Bailey. Measuring Ethereum's Peer-to-Peer Network. In the
2018 ACM Internet Measurement Conference (IMC '18), Boston, MA,
October 31 - November 2, 2018.
[pdf]
[bib]
-
Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and
Michael Bailey. Erays: Reverse Engineering Ethereum's Opaque Smart
Contracts. In 27th USENIX Security Symposium (USENIX Security '18),
Baltimore, MD, August 15-17, 2018.
[pdf]
[bib]
-
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent,
Joshua Mason, Adam Bates, and Michael Bailey. Skill Squatting Attacks
on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security
'18), Baltimore, MD, August 15-17, 2018.
[pdf]
[bib]
-
Dave (Jing) Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam
Bates, and Kevin R. B. Butler. "Plug & Pray" Today Understanding USB
Insecurity in Versions 1 through C. In IEEE Security & Privacy
(Oakland) 2018 (S&P '18), San Francisco, California, May 21-23, 2018.
[pdf]
[bib]
-
Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Joshua
Mason, Michael Bailey, Gabrielle Beck, David Adrian, Zakir Durumeric,
and J. Alex Halderman. Tracking Certificate Misissuance in the
Wild. In IEEE Security & Privacy (Oakland) 2018 (S&P '18), San
Francisco, California, May 21-23, 2018.
[pdf]
[bib]
-
Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie
Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca
Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma,
Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt
Thomas, Yi Zhou. Understanding the Mirai Botnet. In 26th USENIX
Security Symposium (USENIX Security '17), Vancouver, Canada, August
16-18, 2017.
[pdf]
[bib]
-
Deepak Kumar, Zane Ma, Zakir Durumeric, Ariana Mirian, Joshua Mason,
Michael Bailey and J. Alex Halderman. Security Challenges in an
Increasingly Tangled Web. In 26th International World Wide Web
Conference (WWW '17), Perth, Australia, April 3-7, 2017.
[pdf]
[bib]
-
Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick
Sullivan, Elie Bursztein, Michael Bailey, J. Alex Halderman, and Vern
Paxson. The Security Impact of HTTPS Interception. In the Network and
Distributed System Security Symposium 2017 (NDSS '17), San Diego,
California, February 2017.
[pdf]
[bib]
- Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon
Chuenchujit, Tim Yardley, Robin Berthier, Josh Mason, Zakir Durumeric,
J. Alex Halderman and Michael Bailey. An Internet-Wide View of ICS
Devices. In 2016 Privacy, Security and Trust Conference,
Auckland, New Zealand, December 2016.
[pdf]
[bib]
- Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir
Durumeric, Michael Bailey, and J. Alex Halderman. Towards a Complete
View of the Certificate Ecosystem. In ACM Internet Measurement
Conference 2016 (IMC '16), Santa Monica, California, November 14-16,
2016.
[pdf]
[bib]
- Zhuotao Liu, Hao Jin, Yih-Chun Hu, and Michael
Bailey. MiddlePolice: Toward Enforcing Destination-Defined Policies in
the Middle of the Internet. In Proceedings of 23rd ACM Conference on
Computer and Communications Security (CCS '16), Hofburg Palace,
Vienna, Austria, October 24-28, 2016.
[pdf]
[bib]
- Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ari Berger, Ori Folger,
Amir Hardon, Elie Bursztein, and Michael Bailey. The Abuse Sharing
Economy: Understanding the Limits of Threat Exchanges. In 19th
International Symposium on Research in Attacks, Intrusions and
Defenses (RAID '16), Evry, France, September 19-21, 2016.
[pdf]
[bib]
- Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Damon
McCoy, Stefan Savage, Michael Bailey, and Vern Paxson. You've Got
Vulnerability: Exploring Effective Vulnerability Notifications. In
25th USENIX Security Symposium (USENIX Security '16), Austin, Texas,
August 10-12, 2016
[pdf]
[bib]
- Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec
Mori, Elie Bursztein, and Michael Bailey. Users Really Do Plug in USB
Drives They Find. In IEEE Security & Privacy (Oakland) 2016
(S&P '16), San Jose, California, May 23-25, 2016.
[pdf]
[bib]
- Jakub J. Czyz, Matthew Luckie, Mark Allman, Michael Bailey. Don't
Forget to Lock the Back Door! A Characterization of IPv6 Network
Security Policy. In Proceedings of the 23rd Annual Network and
Distributed System Security Symposium (NDSS '16), San Diego,
California, February 21-24, 2016.
[pdf]
[bib]
- Zakir Durumeric, David Adrian, Ariana Mirian, Kurt Thomas, Vijay
Eranti, Nicolas Lidzborski, Elie Bursztein, Michael Bailey, J. Alex
Halderman, and James Kasten. Neither Snow Nor Rain Nor MITM: ... An
Empirical Analysis of Mail Delivery Security. In Proceedings of the
2015 Internet Measurement Conference (IMC '15), Tokyo, Japan, October
28-30, 2015.
[pdf]
[bib]
- Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey,
J. Alex Halderman. A Search Engine Backed by Internet-Wide
Scanning. In Proceedings of 22nd ACM Conference on Computer and
Communications Security (CCS '15), Denver, Colorado, October 12-16,
2015.
[pdf]
[bib]
- Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh Ardabili,
Manish Karir, Michael Bailey, Mingyan Liu. Cloudy with a Chance of
Breach: Forecasting Cyber Security Incidents. In Proceedings of the
24th USENIX Security Symposium (USENIX Security '15), Washington, DC,
August 12 - 14, 2015.
[pdf]
[bib]
- Seyed K. Fayaz, Yoshiaki Tobioka, Vyas Sekar, Michael
Bailey. Flexible and Elastic DDoS Defense using Bohatei. In
Proceedings of the 24th USENIX Security Symposium (USENIX Security
'15), Washington, DC, August 12 - 14, 2015.
[pdf]
[bib]
- Matthew Sargent, Jakub Czyz, Mark Allman, and Michael Bailey. On
The Power and Limitations of Detecting Network Filtering via Passive
Observation. In Proceedings of the 16th Passive and Active Measurement
Conference (PAM '15), New York, New York, USA, March, 2015.
[pdf]
[bib]
- Yang Liu, Jing Zhang, Armin Sarabi, Mingyan Liu, Manish Karir,
Michael Bailey. Predicting Cyber Security Incidents Using
Feature-Based Characterization of Network-Level Malicious
Activities. In International Workshop on Security and Privacy
Analytics (SPA '15), San Antonio, TX, USA, March 2015.
[pdf]
[bib]
- Zakir Durumeric, Frank Li, James Kasten, Johanna Amann, Jethro
Beekman, Mathias Payer, Nicolas Weaver, David Adrian, Vern Paxson,
Michael Bailey, and J. Alex Halderman. The Matter of Heartbleed. In
Proceedings of the 14th ACM SIGCOMM Conference on Internet Measurement
(IMC '14), Vancouver, BC, Canada, November 5-7, 2014. (Best Paper)
[pdf]
[bib]
- Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos
Papadopoulos, Michael Bailey, and Manish Karir. Taming the 800 Pound
Gorilla: The Rise and Decline of NTP DDoS Attacks. In Proceedings of
the 14th ACM SIGCOMM Conference on Internet Measurement (IMC '14),
Vancouver, BC, Canada, November 5-7, 2014.
[pdf]
[bib]
-
Zakir Durumeric, Michael Bailey, and J. Alex Halderman. An
Internet-wide View of Internet-wide Scanning. In 23rd USENIX Security
Symposium (USENIX Security '14), San Diego, California, August 20-22,
2014.
[pdf]
[bib]
-
Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric
Osterweil, and Michael Bailey. Measuring IPv6 Adoption. In ACM SIGCOMM
2014 Conference (SIGCOMM '14), Chicago, Illinois, August 17-22, 2014.
[pdf]
[bib]
-
Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric
Osterweil, and Michael Bailey. Measuring IPv6 Adoption. Technical
Report TR-13-004, International Computer Science Institute (ICSI),
Berkeley, CA, USA, August 2013
[pdf]
[bib]
-
Yunjing Xu, Zachary Musgrave, Brian Noble, Michael
Bailey. Workload-Aware Provisioning in Public Clouds. IEEE Internet
Computing 18(4):15-21, 2014.
[pdf]
[bib]
-
Erin Kenneally and Michael Bailey. Cyber-security Research Ethics
Dialogue & Strategy Workshop Report. ACM SIGCOMM Computer
Communication Review (CCR). Volume 44 Issue 2, April 2014. Pages
76-79.
[pdf]
[bib]
-
Jing Zhang, Zakir Durumeric, Michael Bailey, Manish Karir, and Mingyan
Liu. On the Mismanagement and Maliciousness of Networks. In
Proceedings of the 21st Annual Network & Distributed System Security
Symposium (NDSS '14), San Diego, California, USA, February 2014.
[pdf]
[bib]
-
D. Dittrich, M. Bailey, and E. Kenneally. Applying Ethical Principles
to Information and Communication Technology Research: A Companion to
the Menlo Report. Technical report, U.S. Department of Homeland
Security, Oct 2013.
[pdf]
[bib]
-
Yunjing Xu, Michael Bailey, Brian Noble, and Farnam Jahanian. Small is
Better: Avoiding Latency Traps in Virtualized Data Centers. In 2013
ACM Symposium on Cloud Computing (SOCC '13), Santa Clara, CA, October
2013.
[pdf]
[bib]
-
Denis Bueno, Kevin Compton, Karem Sakallah, and Michael
Bailey. Detecting Traditional Packers, Decisively. In Proceedings of
the 16th International Symposium on Research in Attacks, Intrusions
and Defenses (RAID '13), St. Lucia, October 2013.
[pdf]
[bib]
-
Jakub Czyz, Kyle Lady, Sam Miller, Michael Bailey, Michael Kallitsis,
and Manish Karir. Understanding IPv6 Internet Background Radiation. In
Proceedings of the 13th ACM SIGCOMM Conference on Internet Measurement
(IMC '13), Barcelona, Spain, October 2013.
[pdf]
[bib]
-
Zakir Durumeric, James Kasten, Michael Bailey, and J. Alex
Halderman. Security Analysis of HTTPS Usage and Certicate
Ecosystem. In Proceedings of the 13th ACM SIGCOMM Conference on
Internet Measurement (IMC '13), Barcelona, Spain, October 2013.
[pdf]
[bib]
-
Yunjing Xu, Zachary Musgrave, Brian Noble and Michael Bailey. Bobtail:
Avoiding Long Tails in the Cloud. In Proceedings of the 10th USENIX
Symposium on Networked Systems Design and Implementation (NSDI '13)
Lombard, Illinois, USA, April 2013.
[pdf]
[bib]
-
Jing Zhang, Ari Chivukula, Michael Bailey, Manish Karir, and Mingyan
Liu. Characterization of Blacklists and Tainted Network Traffic. In
Proceedings of the 14th Passive and Active Measurement Conference
(PAM '13), Hong Kong, Hong Kong, March 18 - 20, 2013.
[pdf]
[bib]
-
Andrew White, Srinivas Krishnan, Phillip Porras, Michael Bailey, and
Fabian Monrose. Clear and Present Data: Opaque Traffic and its
Security Implications for the Future. In Proceedings of the 20th
Annual Network & Distributed System Security Symposium (NDSS '13),
San Diego, California, USA, February 2013.
[pdf]
[bib]
-
Jing Zhang, Robin Berthier, William Rhee, Michael Bailey, Partha
Pal, William Sanders and Farnam Jahanian. Safeguarding Academic
Accounts and Resources with the University Credential Abuse Auditing
System. In Proceedings of the 42nd Annual IEEE International
Conference on Dependable Systems and Networks (DSN '12), Boston,
Massachusetts, USA, June 25 - 28, 2012.
[pdf]
[bib]
-
Jing Zhang, Robin Berthier, William Rhee, Michael Bailey, Partha
Pal, William Sanders, Farnam Jahanian. Learning From Early Attempts
To Measure Information Security Performance. In Proceedings of the
5th Workshop on Cyber Security Experimentation and Test (CSET '12),
Bellevue, WA, USA, August 2012.
[pdf]
[bib]
-
Michael Bailey, David Dittrich, Erin Kenneally, Doug
Maughan. The Menlo Report. IEEE Security and Privacy 10(2):71-75,
2012.
[pdf]
[bib]
-
Erin Kenneally, Michael Bailey, and David Dittrich. A Refined
Ethical Impact Assessment Tool and a Case Study of its
Application. In Workshop on Ethics in Computer Security Research
(WECSR '12), Bonaire, Netherlands, 2012.
[pdf]
[bib]
-
Yunjing Xu, Michael Bailey, Farnam Jahanian, Kaustubh Joshi, Matti
Hiltunen, and Richard Schlichting. An Exploration of L2 Cache Covert
Channels in Virtualized Environments. In 3rd ACM Cloud Computing
Security Workshop (CCSW '11), pages 29-40, Chicago, IL, USA, October
2011.
[pdf]
[bib]
-
David Dittrich, Michael Bailey, Sven Dietrich. Building an Active
Computer Security Ethics Community. IEEE Security and Privacy,
9(4):18-26, 2011.
[pdf]
[bib]
-
Michael Bailey and Craig Labovitz. Censorship and Co-option of the
Internet Infrastructure. Technical Report CSE-TR-572-11, University of
Michigan, Ann Arbor, MI, USA, July 2011.
[pdf]
[bib]
-
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey, and Farnam
Jahanian. A Comparative Study of Two Network-based Anomaly Detection
Methods. In (mini-conference) The 30th IEEE International Conference
on Computer Communications (INFOCOM '11), Shanghai, China, April
2011.
[pdf]
[bib]
-
Scott Coull, Fabian Monrose, and Michael Bailey. On Measuring the
Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical
Analyses. In Proceedings of the 18th Annual Network & Distributed
System Security Symposium (NDSS '11), San Diego, California, USA,
February 2011.
[pdf]
[bib]
-
Yunjing Xu, Michael Bailey, Eric Vander Weele, and Farnam
Jahanian. CANVuS: Context-Aware Network Vulnerability Scanning. In
Proceedings of the 13th International Symposium on Recent Advances in
Intrusion Detection (RAID '10), Ottawa, Ontario, Canada, September
2010.
[pdf]
[bib]
-
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff
Houston. Internet Background Radiation Revisited. In Proceedings of
the 10th ACM SIGCOMM Conference on Internet Measurement (IMC '10),
Melbourne, Australia, November 2010.
[pdf]
[bib]
-
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff Houston. Internet Background Radiation
Revisited. Technical Report CSE-TR-564-10, University of Michigan, Ann Arbor, MI, USA, June 2010.
-
Sushant Sinha, Michael Bailey, and Farnam Jahanian. Improving SPAM Blacklisting through Dynamic Thresholding
and Speculative Aggregation. In Proceedings of the 17th Annual Network & Distributed System Security
Symposium (NDSS '10), San Diego, California, USA, February-March 2010.
[pdf]
[bib]
-
Erin Kenneally, Michael Bailey, and Douglas Maughan. A Framework for Understanding and Applying Ethical Principles in Network and Security Research. In Workshop on Ethics in Computer Security Research (WECSR '10), Tenerife, Canary Islands, Spain, January 2010.
[pdf]
[bib]
-
David Dittrich, Michael Bailey, Sven Dietrich. Towards Community Standards for Ethical Behavior in Computer Security Research. Stevens CS Technical Report 2009-1, 20 April 2009.
[pdf]
[bib]
-
David Dittrich, Michael Bailey, and Sven Dietrich. Have we Crossed the Line? The Growing Ethical Debate
in Modern Computer Security Research. In (Poster at) Proceedings of the 16th ACM Conference on Computer
and Communication Security (CCS '09), Chicago, Illinois USA, November 2009
[pdf]
[bib]
-
Jon Oberheide, Michael Bailey, and Farnam Jahanian. PolyPack: An Automated Online Packing Service for
Optimal Antivirus Evasion. In 3rd USENIX Workshop on Offensive Technologies (WOOT '09), Montreal, Canada,
August 2009.
[pdf]
[bib]
-
Sushant Sinha, Michael Bailey, and Farnam Jahanian. One Size Does Not Fit All: 10 Years of Applying Context Aware Security. In Proceedings of the 2009 IEEE International Conference on Technologies for Homeland Security (HST '09), Waltham, Massachusetts, USA, May 2009.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu, and Manish Karir. A Survey of Botnet Technology and Defenses. In Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH '09), pages 299-304, Washington, District of Columbia, USA, March 2009.
[pdf]
[bib]
-
Scott E. Coull, Fabian Monrose, Michael K. Reiter, and Michael Bailey. The Challenges of Effectively Anonymizing Network Data. In Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH '09), pages 230-236, Washington, District of Columbia, USA, March 2009.
[pdf]
[bib]
-
Sushant Sinha, Michael Bailey, and Farnam Jahanian. Shades of Grey: On the Effectiveness of Reputation-based blacklists. In Proceedings of the 3rd International Conference on Malicious and Unwanted Software (MALWARE '08), pages 57-64, Fairfax, Virginia, USA, October 2008.
[pdf]
[bib]
-
Xu Chen, Jon Andersen, Z. Morley Mao, Michael Bailey, and Jose Nazario. Towards an Understanding of Anti-Virtualization and Anti-Debugging Behavior in Modern Malware. In Proceedings of the 38th Annual IEEE International Conference on Dependable Systems and Networks (DSN '08), pages 177-186, Anchorage, Alaska, USA, June 2008.
[pdf]
[bib]
-
Sushant Sinha, Michael Bailey, and Farnam Jahanian. Shedding Light on the Configuration of Dark Addresses. In Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS '07), pages 125-139, San Diego, California, USA, February-March 2007.
[pdf]
[bib]
-
Michael Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, and Jose Nazario. Automated Classification and Analysis of Internet Malware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID '07), pages 178-197, Gold Coast, Australia, September 2007.
[pdf]
[bib]
-
Michael Donald Bailey. A Scalable Hybrid Network Monitoring Architecture for Measuring, Characterizing, and Tracking Internet Threat Dynamics. PhD thesis, University of Michigan, Ann Arbor, MI, USA, 2006.
[pdf]
[bib]
-
Evan Cooke, Michael Bailey, Farnam Jahanian, and Richard Mortier. The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery. In Proceedings of the 3rd Symposium on Networked Systems Design & Implementation (NSDI '06), pages 101-114, San Jose, California, USA, May 2006.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Andrew Myrick, and Sushant Sinha. Practical Darknet Measurement. In Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS '06), pages 1496-1501, Princeton, New Jersey, USA, March 2006.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, and Jose Nazario. The Blaster Worm: Then and Now. IEEE Security and Privacy, 3(4):26-31, 2005.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, and David Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05), pages 239-252, Berkeley, California, USA, October 2005.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, and Jose Nazario. The Internet Motion Sensor - A Distributed Blackhole Monitoring System. In Proceedings of the 12th Annual Network & Distributed System Security Symposium (NDSS '05), pages 167-179, San Diego, California, USA, February 2005.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, David Watson, Farnam Jahanian, and Niels Provos. A Hybrid Honeypot Architecture for Scalable Network Monitoring. Technical Report CSE-TR-499-04, University of Michigan, Ann Arbor, Michigan, USA, October 2004.
[pdf]
[bib]
-
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, Farnam Jahanian, and Danny McPherson. Toward Understanding Distributed Blackhole Placement. In Proceedings of the 2nd Workshop on Rapid Malcode (WORM '04), pages 54-64, Washington, District of Columbia, USA, October 2004.
[pdf]
[bib]
-
Michael Bailey, Farnam Jahanian, G. Robert Malan, Jose Nazario, Dug Song, and Robert Stone. Measuring, Characterizing, and Tracking Internet Threat Dynamics. In Proceedings of the OpenSig 2003 Workshop (OpenSig '03), New York, New York, USA, October 2003.
[pdf]
[bib]
-
Craig Labovitz, Abha Ahuja, and Michael Bailey. Shining light on dark address space. Technical Report TR-2001-01, Arbor Netwoks, Ann Arbor, Michigan, USA, November 2001.
[pdf]
[bib]
Contact Information
Email
mdbailey AT illinois DOT edu
U.S. Mail Address:
Department of Electrical and Computer Engineering
University of Illinois at Urbana-Champaign
458 Coordinated Science Laboratory
1308 W Main Street
Urbana, IL 61801-2307