Michael D. Bailey

Orcid: 0000-0002-0250-9164

Affiliations:
  • Georgia Institute of Technology, Atlanta, GA, USA
  • University of Illinois Urbana-Champaign, IL, USA (former)


According to our database1, Michael D. Bailey authored at least 76 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2022
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
WebSocket Adoption and the Landscape of the Real-Time Web.
Proceedings of the WWW '21: The Web Conference 2021, 2021

What's in a Name? Exploring CA Certificate Control.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Designing Toxic Content Classification for a Diversity of Perspectives.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Tracing your roots: exploring the TLS trust anchor ecosystem.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Measuring DNS-over-HTTPS performance around the world.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
Empirical Measurement of Systemic 2FA Usability.
Proceedings of the 29th USENIX Security Symposium, 2020

Measuring Identity Confusion with Uniform Resource Locators.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Emerging Threats in Internet of Things Voice Services.
IEEE Secur. Priv., 2019

Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
Proceedings of the World Wide Web Conference, 2019

The Impact of Secure Transport Protocols on Phishing Efficacy.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

2018
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control.
IEEE/ACM Trans. Netw., 2018

Erays: Reverse Engineering Ethereum's Opaque Smart Contracts.
Proceedings of the 27th USENIX Security Symposium, 2018

Skill Squatting Attacks on Amazon Alexa.
Proceedings of the 27th USENIX Security Symposium, 2018

SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Tracking Certificate Misissuance in the Wild.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Measuring Ethereum Network Peers.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
The Danger of USB Drives.
IEEE Secur. Priv., 2017

MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation.
CoRR, 2017

Security Challenges in an Increasingly Tangled Web.
Proceedings of the 26th International Conference on World Wide Web, 2017


The Security Impact of HTTPS Interception.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium, 2016

Users Really Do Plug in USB Drives They Find.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

An Internet-wide view of ICS devices.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Towards a Complete View of the Certificate Ecosystem.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Proceedings of the 24th USENIX Security Symposium, 2015

Bohatei: Flexible and Elastic DDoS Defense.
Proceedings of the 24th USENIX Security Symposium, 2015

On the Power and Limitations of Detecting Network Filtering via Passive Observation.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Packer classifier based on PE header information.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

A Search Engine Backed by Internet-Wide Scanning.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Workload-Aware Provisioning in Public Clouds.
IEEE Internet Comput., 2014

Cyber-security research ethics dialogue & strategy workshop.
Comput. Commun. Rev., 2014

An Internet-Wide View of Internet-Wide Scanning.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Measuring IPv6 adoption.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

On the Mismanagement and Maliciousness of Networks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

The Matter of Heartbleed.
Proceedings of the 2014 Internet Measurement Conference, 2014

Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Detecting Traditional Packers, Decisively.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Characterization of Blacklists and Tainted Network Traffic.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Understanding IPv6 Populations in the Wild.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Bobtail: Avoiding Long Tails in the Cloud.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Clear and Present Data: Opaque Traffic and its Security Implications for the Future.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Analysis of the HTTPS certificate ecosystem.
Proceedings of the 2013 Internet Measurement Conference, 2013

Understanding IPv6 internet background radiation.
Proceedings of the 2013 Internet Measurement Conference, 2013

Small is better: avoiding latency traps in virtualized data centers.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013

2012
The Menlo Report.
IEEE Secur. Priv., 2012

Learning from Early Attempts to Measure Information Security Performance.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

A Refined Ethical Impact Assessment Tool and a Case Study of Its Application.
Proceedings of the Financial Cryptography and Data Security, 2012

Safeguarding academic accounts and resources with the University Credential Abuse Auditing System.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Building an Active Computer Security Ethics Community.
IEEE Secur. Priv., 2011

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
Proceedings of the Network and Distributed System Security Symposium, 2011

A comparative study of two network-based anomaly detection methods.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

An exploration of L2 cache covert channels in virtualized environments.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
CANVuS: Context-Aware Network Vulnerability Scanning.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.
Proceedings of the Network and Distributed System Security Symposium, 2010

Internet background radiation revisited.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

A Framework for Understanding and Applying Ethical Principles in Network and Security Research.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

2008
Shades of grey: On the effectiveness of reputation-based "blacklists".
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Automated Classification and Analysis of Internet Malware.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Shedding Light on the Configuration of Dark Addresses.
Proceedings of the Network and Distributed System Security Symposium, 2007

2006
The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

Practical Darknet Measurement.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
The Blaster Worm: Then and Now.
IEEE Secur. Priv., 2005

The Internet Motion Sensor - A Distributed Blackhole Monitoring System.
Proceedings of the Network and Distributed System Security Symposium, 2005

Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Toward understanding distributed blackhole placement.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004


  Loading...