Follow
Michael Donald Bailey
Michael Donald Bailey
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Understanding the Mirai Botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
27192017
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
11142014
Automated classification and analysis of internet malware
M Bailey, J Oberheide, J Andersen, ZM Mao, F Jahanian, J Nazario
International Workshop on Recent Advances in Intrusion Detection, 178-197, 2007
8842007
A search engine backed by Internet-wide scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6322015
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
X Chen, J Andersen, ZM Mao, M Bailey, J Nazario
2008 IEEE International Conference on Dependable Systems & Networks With …, 2008
5072008
Analysis of the HTTPS certificate ecosystem
Z Durumeric, J Kasten, M Bailey, JA Halderman
Proceedings of the 2013 conference on Internet measurement conference, 291-304, 2013
4432013
The Internet Motion Sensor-A Distributed Blackhole Monitoring System.
M Bailey, E Cooke, F Jahanian, J Nazario, D Watson
NDSS, 2005
3992005
Bohatei: Flexible and Elastic DDoS Defense.
SK Fayaz, Y Tobioka, V Sekar, M Bailey
USENIX Security Symposium, 817-832, 2015
3822015
A survey of botnet technology and defenses
M Bailey, E Cooke, F Jahanian, Y Xu, M Karir
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
3532009
An exploration of L2 cache covert channels in virtualized environments
Y Xu, M Bailey, F Jahanian, K Joshi, M Hiltunen, R Schlichting
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 29-40, 2011
3402011
Bobtail: Avoiding Long Tails in the Cloud.
Y Xu, Z Musgrave, B Noble, M Bailey
NSDI 13, 329-342, 2013
3052013
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
USENIX Security Symposium, 1009-1024, 2015
2552015
An Internet-Wide View of Internet-Wide Scanning.
Z Durumeric, M Bailey, JA Halderman
USENIX Security Symposium, 65-78, 2014
2542014
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks
J Czyz, M Kallitsis, M Gharaibeh, C Papadopoulos, M Bailey, M Karir
Proceedings of the 2014 Conference on Internet Measurement Conference, 435-448, 2014
2332014
Skill Squatting Attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th USENIX Security Symposium (USENIX Security '18), 2018
2322018
The Security Impact of HTTPS Interception
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
Network and Distributed Systems Symposium (NDSS’17), 2017
2192017
Measuring Ethereum Network Peers
SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey
Proceedings of the Internet Measurement Conference 2018, 91-104, 2018
2142018
Measuring ipv6 adoption
J Czyz, M Allman, J Zhang, S Iekel-Johnson, E Osterweil, M Bailey
Proceedings of the 2015 ACM SIGCOMM Conference, 2015
2112015
Internet background radiation revisited
E Wustrow, M Karir, M Bailey, F Jahanian, G Huston
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010
2112010
The menlo report
M Bailey, D Dittrich, E Kenneally, D Maughan
IEEE Security & Privacy 10 (2), 71-75, 2012
2052012
The system can't perform the operation now. Try again later.
Articles 1–20