What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michael D. Bailey
Google Scholar
33
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
The Guardians of Name Street: Studying the Defensive Registration Practices of the Fortune 500.
Boladji Vinny Adjibi
Athanasios Avgetidis
Manos Antonakakis
Michael D. Bailey
Fabian Monrose
2022
conf/esorics
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations.
Joshua Reynolds
Adam Bates
Michael D. Bailey
2021
conf/uss
What's in a Name? Exploring CA Certificate Control.
Zane Ma
Joshua Mason
Manos Antonakakis
Zakir Durumeric
Michael D. Bailey
2021
conf/sp
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Kurt Thomas
Devdatta Akhawe
Michael D. Bailey
Dan Boneh
Elie Bursztein
Sunny Consolvo
Nicola Dell
Zakir Durumeric
Patrick Gage Kelley
Deepak Kumar
Damon McCoy
Sarah Meiklejohn
Thomas Ristenpart
Gianluca Stringhini
2021
conf/soups
Designing Toxic Content Classification for a Diversity of Perspectives.
Deepak Kumar
Patrick Gage Kelley
Sunny Consolvo
Joshua Mason
Elie Bursztein
Zakir Durumeric
Kurt Thomas
Michael D. Bailey
2020
conf/uss
Empirical Measurement of Systemic 2FA Usability.
Joshua Reynolds
Nikita Samarin
Joseph D. Barnes
Taylor Judd
Joshua Mason
Michael D. Bailey
Serge Egelman
2019
conf/uss
The Impact of Secure Transport Protocols on Phishing Efficacy.
Zane Ma
Joshua Reynolds
Joseph Dickinson
Kaishen Wang
Taylor Judd
Joseph D. Barnes
Joshua Mason
Michael D. Bailey
2018
conf/uss
Skill Squatting Attacks on Amazon Alexa.
Deepak Kumar
Riccardo Paccagnella
Paul Murley
Eric Hennenfent
Joshua Mason
Adam Bates
Michael D. Bailey
2018
conf/uss
Erays: Reverse Engineering Ethereum's Opaque Smart Contracts.
Yi Zhou
Deepak Kumar
Surya Bakshi
Joshua Mason
Andrew Miller
Michael D. Bailey
2018
conf/sp
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C.
Jing (Dave) Tian
Nolen Scaife
Deepak Kumar
Michael D. Bailey
Adam Bates
Kevin R. B. Butler
2018
conf/sp
Tracking Certificate Misissuance in the Wild.
Deepak Kumar
Zhengping Wang
Matthew Hyder
Joseph Dickinson
Gabrielle Beck
David Adrian
Joshua Mason
Zakir Durumeric
J. Alex Halderman
Michael D. Bailey
2017
conf/uss
Understanding the Mirai Botnet.
Manos Antonakakis
Tim April
Michael D. Bailey
Matt Bernhard
Elie Bursztein
Jaime Cochran
Zakir Durumeric
J. Alex Halderman
Luca Invernizzi
Michalis Kallitsis
Deepak Kumar
Chaz Lever
Zane Ma
Joshua Mason
Damian Menscher
Chad Seaman
Nick Sullivan
Kurt Thomas
Yi Zhou
2017
conf/ndss
The Security Impact of HTTPS Interception.
Zakir Durumeric
Zane Ma
Drew Springall
Richard Barnes
Nick Sullivan
Elie Bursztein
Michael D. Bailey
J. Alex Halderman
Vern Paxson
2016
conf/ccs
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet.
Zhuotao Liu
Hao Jin
Yih-Chun Hu
Michael D. Bailey
2016
conf/uss
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Frank Li
Zakir Durumeric
Jakub Czyz
Mohammad Karami
Michael D. Bailey
Damon McCoy
Stefan Savage
Vern Paxson
2016
conf/sp
Users Really Do Plug in USB Drives They Find.
Matthew Tischer
Zakir Durumeric
Sam Foster
Sunny Duan
Alec Mori
Elie Bursztein
Michael D. Bailey
2016
conf/ndss
Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy.
Jakub Czyz
Matthew J. Luckie
Mark Allman
Michael D. Bailey
2015
conf/ccs
A Search Engine Backed by Internet-Wide Scanning.
Zakir Durumeric
David Adrian
Ariana Mirian
Michael D. Bailey
J. Alex Halderman
2015
conf/uss
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Yang Liu
Armin Sarabi
Jing Zhang
Parinaz Naghizadeh
Manish Karir
Michael D. Bailey
Mingyan Liu
2015
conf/uss
Bohatei: Flexible and Elastic DDoS Defense.
Seyed Kaveh Fayaz
Yoshiaki Tobioka
Vyas Sekar
Michael D. Bailey
2014
conf/uss
An Internet-Wide View of Internet-Wide Scanning.
Zakir Durumeric
Michael D. Bailey
J. Alex Halderman
2014
conf/ndss
On the Mismanagement and Maliciousness of Networks.
Jing Zhang
Zakir Durumeric
Michael D. Bailey
Mingyan Liu
Manish Karir
2013
conf/ndss
Clear and Present Data: Opaque Traffic and its Security Implications for the Future.
Andrew M. White
Srinivas Krishnan
Michael D. Bailey
Fabian Monrose
Phillip A. Porras
2012
conf/uss
Learning from Early Attempts to Measure Information Security Performance.
Jing Zhang
Robin Berthier
Will Rhee
Michael D. Bailey
Partha P. Pal
Farnam Jahanian
William H. Sanders
2012
conf/fc
A Refined Ethical Impact Assessment Tool and a Case Study of Its Application.
Michael D. Bailey
Erin Kenneally
David Dittrich
2012
conf/dsn
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System.
Jing Zhang
Robin Berthier
Will Rhee
Michael D. Bailey
Partha P. Pal
Farnam Jahanian
William H. Sanders
2011
conf/ccs
An exploration of L2 cache covert channels in virtualized environments.
Yunjing Xu
Michael D. Bailey
Farnam Jahanian
Kaustubh R. Joshi
Matti A. Hiltunen
Richard D. Schlichting
2011
conf/ndss
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
Scott E. Coull
Fabian Monrose
Michael D. Bailey
2010
conf/fc
A Framework for Understanding and Applying Ethical Principles in Network and Security Research.
Erin Kenneally
Michael D. Bailey
Douglas Maughan
2010
conf/ndss
Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.
Sushant Sinha
Michael D. Bailey
Farnam Jahanian
2008
conf/dsn
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware.
Xu Chen
Jonathon Andersen
Zhuoqing Morley Mao
Michael D. Bailey
Jose Nazario
2007
conf/ndss
Shedding Light on the Configuration of Dark Addresses.
Sushant Sinha
Michael D. Bailey
Farnam Jahanian
2005
conf/ndss
The Internet Motion Sensor - A Distributed Blackhole Monitoring System.
Michael D. Bailey
Evan Cooke
Farnam Jahanian
Jose Nazario
Coauthors
Adam Bates
(3)
Alec Mori
(1)
Andrew M. White
(1)
Andrew Miller
(1)
Ariana Mirian
(1)
Armin Sarabi
(1)
Athanasios Avgetidis
(1)
Boladji Vinny Adjibi
(1)
Chad Seaman
(1)
Chaz Lever
(1)
Damian Menscher
(1)
Damon McCoy
(2)
Dan Boneh
(1)
David Adrian
(2)
David Dittrich
(1)
Deepak Kumar
(7)
Devdatta Akhawe
(1)
Douglas Maughan
(1)
Drew Springall
(1)
Elie Bursztein
(5)
Eric Hennenfent
(1)
Erin Kenneally
(2)
Evan Cooke
(1)
Fabian Monrose
(3)
Farnam Jahanian
(6)
Frank Li
(1)
Gabrielle Beck
(1)
Gianluca Stringhini
(1)
Hao Jin
(1)
J. Alex Halderman
(5)
Jaime Cochran
(1)
Jakub Czyz
(2)
Jing (Dave) Tian
(1)
Jing Zhang
(4)
Jonathon Andersen
(1)
Jose Nazario
(2)
Joseph D. Barnes
(2)
Joseph Dickinson
(2)
Joshua Mason
(8)
Joshua Reynolds
(3)
Kaishen Wang
(1)
Kaustubh R. Joshi
(1)
Kevin R. B. Butler
(1)
Kurt Thomas
(3)
Luca Invernizzi
(1)
Manish Karir
(2)
Manos Antonakakis
(3)
Mark Allman
(1)
Matt Bernhard
(1)
Matthew Hyder
(1)
Matthew J. Luckie
(1)
Matthew Tischer
(1)
Matti A. Hiltunen
(1)
Michael D. Bailey
(33)
Michalis Kallitsis
(1)
Mingyan Liu
(2)
Mohammad Karami
(1)
Nick Sullivan
(2)
Nicola Dell
(1)
Nikita Samarin
(1)
Nolen Scaife
(1)
Parinaz Naghizadeh
(1)
Partha P. Pal
(2)
Patrick Gage Kelley
(2)
Paul Murley
(1)
Phillip A. Porras
(1)
Riccardo Paccagnella
(1)
Richard Barnes
(1)
Richard D. Schlichting
(1)
Robin Berthier
(2)
Sam Foster
(1)
Sarah Meiklejohn
(1)
Scott E. Coull
(1)
Serge Egelman
(1)
Seyed Kaveh Fayaz
(1)
Srinivas Krishnan
(1)
Stefan Savage
(1)
Sunny Consolvo
(2)
Sunny Duan
(1)
Surya Bakshi
(1)
Sushant Sinha
(2)
Taylor Judd
(2)
Thomas Ristenpart
(1)
Tim April
(1)
Vern Paxson
(2)
Vyas Sekar
(1)
Will Rhee
(2)
William H. Sanders
(2)
Xu Chen
(1)
Yang Liu
(1)
Yi Zhou
(2)
Yih-Chun Hu
(1)
Yoshiaki Tobioka
(1)
Yunjing Xu
(1)
Zakir Durumeric
(11)
Zane Ma
(4)
Zhengping Wang
(1)
Zhuoqing Morley Mao
(1)
Zhuotao Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to