About Me
I am currently the department chair
of the School of Cybersecurity and Privacy
(SCP) at the Georgia Institute of Technology.
Until recently I was part of a large cohort of faculty,
staff, and students at UIUC that do great work in security called
the Security and Privacy Research
Group at Illinois (SPR@I).
If you are interested in what I have done professionally, you are welcome to
read my CV.
Teaching
As the inaugural chair, I do not currently teach courses at GaTech, as I am
busy working with the faculty and staff to create new
undergraduate threads,
expand our professsional
masters program, and explore a new Cybersecurity and Privacy Ph.D.. Last
year SCP added some amazing courses including: The Psychology of
Cybersecurity, Critical Infrastructures Security and Resilience, and Security
Operations and Incident Response. Much much more to come.
In the past I have taught a variety of systems classes including Operating
Systems, Networking, Distributed Systems, and Security. The most recent classes
included:
Collaborators
I am currently looking for 1-2 Ph.D. students to join me for the '24-'25
AY.
Before coming to GaTech, I was blessed to have had an incredible cohort of
UIUC Ph.D. students who have graduated and moved on to do some amazing things:
I was super grateful to have had the chance to work with Dr. Joshua Mason while at UIUC.
At Michigan, I had an opportunity to co-advised (as research faculty), several amazing students:
-
Dr. Jakub Czyz, CrowdStrike
-
Dr. Jing Zhang, Composite Capital Management
-
Dr. Yunjing Xu, DiDi
Research
My interets lie in exploring the security, performance, and
availability properties of computing systems. My work seeks to both
inform the development of these systems to address immediate,
important societal problems as well as to fundementially enhance our
understanding of the sciences underlying computing subfields including
computer systems organization, networks, and security and privacy.
Papers
(my Google Scholar Citations)
-
Zane Ma, Aaron Faulkenberry, Thomas Papastergiou, Zakir Durumeric, Michael D. Bailey, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis. Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys. 2023 Internet Measurement Conference (IMC 2023), Montréal, Canada, October 24-26, 2023.
-
Joshua Reynolds, Adam Bates and Michael Bailey. Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations. 27th European Symposium on Research in Computer Security (ESORICS 2022), Copenhagen, Denmark, September 26-30, 2022.
-
Zane Ma, James Austgen, Joshua Mason, Zakir Durumeric, and Michael Bailey. Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem. In ACM Internet Measurement Conference 2021 (IMC 2021), (Virtual event), November 2-4, 2021.
-
Rishabh Chhabra, Paul Murley, Deepak Kumar, Michael Bailey, and Gang Wang. Measuring DNS-over-HTTPS Performance Around the World. In ACM Internet Measurement Conference 2021 (IMC 2021), (Virtual event), November 2-4, 2021.
-
Deepak Kumar, Patrick Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, and Michael Bailey. Designing Toxic Content Classification for a Diversity of Perspectives. In Seventeenth Symposium on Usable Privacy and Security (SOUPS '21), (virtual event), August 8-10, 2021.
-
Paul Murley, Zane Ma, Joshua Mason, Michael Bailey and Amin Kharraz. WebSocket
Adoption and the Landscape of the Real-Time Web. In The Web Conference 2021 (WWW
'21), Ljubljana, Slovenia, April 19 - 23, 2021.
[pdf]
[bib]
-
Zane Ma, Manos Antonakakis, Joshua Mason, Zakir Durumeric, and Michael
Bailey. What's in a Name? Exploring CA Certificate Control. In 30th USENIX
Security Symposium (USENIX Security '21), (virtual event), August 11 - 13, 2021.
[pdf]
[bib]
-
Kurt Thomas, Devdatta Akhawe, Michael Bailey, Elie Bursztein, Dan Boneh, Sunny
Consolvo, Nicki Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon
McCoy, Sarah Meiklejohn, Thomas Ristenpart, and Gianluca Stringhini. SoK: Hate,
Harassment, and the Changing Landscape of Online Abuse. In IEEE Security &
Privacy (Oakland) 2021 (S&P '21), San Francisco, California, May 23 - 27, 2021.
[pdf]
[bib]
-
Joshua Reynolds, Nikita Samarin, Joseph Barnes, Taylor Judd, Joshua Mason,
Michael Bailey, and Serge Egelman. Empirical Measurement of Systemic 2FA
Usability. In the 29th USENIX Security Symposium (USENIX Security '20), Boston,
MA, USA, August 12 - 14, 2020.
[pdf]
[bib]
-
Joshua Reynolds, Deepak Kumar, Zane Ma, Rohan Subramaniam, Meishan Wu,
Martin Shelton, Joshua Mason, Emily Stark, and Michael Bailey. Measuring
Identity Confusion with Uniform Resource Locators. 2020 ACM Conference on Human
Factors in Computing Systems (CHI '20), Honolulu, Hawai'i, April 25 - 30, 2020.
[pdf]
[bib]
-
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason,
Adam Bates, and Michael Bailey. Emerging Threats in IoT Voice Services. IEEE
Security and Privacy 17(4):18-24, 2019.
[pdf]
[bib]
-
Zane Ma, Joshua Reynolds, Joseph Dickinson, Kaishen Wang, Taylor Judd, Joseph
D. Barnes, Joshua Mason, and Michael Bailey. The Impact of Secure Transport
Protocols on Phishing Efficacy. USENIX Workshop on Cyber Security
Experimentation and Test (CSET) 2019, Santa Clara, CA, August 12, 2019.
[pdf]
[bib]
-
Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason,
Andrew Miller, Nikita Borisov, Manos Antonakakis and Michael
Bailey. OUTGUARD: Detecting In-Browser Covert Cryptocurrency Mining in
the Wild. In the Web Conference 2019 (formally WWW), San Francisco,
CA, May 13 - 17, 2019. (Best Paper)
[pdf]
[bib]
-
Seoung Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller,
and Michael Bailey. Measuring Ethereum Network Peers. In the
2018 ACM Internet Measurement Conference (IMC '18), Boston, MA,
October 31 - November 2, 2018.
[pdf]
[bib]
-
Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and
Michael Bailey. Erays: Reverse Engineering Ethereum's Opaque Smart
Contracts. In 27th USENIX Security Symposium (USENIX Security '18),
Baltimore, MD, August 15-17, 2018.
[pdf]
[bib]
-
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent,
Joshua Mason, Adam Bates, and Michael Bailey. Skill Squatting Attacks
on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security
'18), Baltimore, MD, August 15-17, 2018.
[pdf]
[bib]
-
Dave (Jing) Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam
Bates, and Kevin R. B. Butler. "Plug & Pray" Today Understanding USB
Insecurity in Versions 1 through C. In IEEE Security & Privacy
(Oakland) 2018 (S&P '18), San Francisco, California, May 21-23, 2018.
[pdf]
[bib]
-
Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Joshua
Mason, Michael Bailey, Gabrielle Beck, David Adrian, Zakir Durumeric,
and J. Alex Halderman. Tracking Certificate Misissuance in the
Wild. In IEEE Security & Privacy (Oakland) 2018 (S&P '18), San
Francisco, California, May 21-23, 2018.
[pdf]
[bib]
-
Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie
Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca
Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma,
Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt
Thomas, Yi Zhou. Understanding the Mirai Botnet. In 26th USENIX
Security Symposium (USENIX Security '17), Vancouver, Canada, August
16-18, 2017.
[pdf]
[bib]
-
Deepak Kumar, Zane Ma, Zakir Durumeric, Ariana Mirian, Joshua Mason,
Michael Bailey and J. Alex Halderman. Security Challenges in an
Increasingly Tangled Web. In 26th International World Wide Web
Conference (WWW '17), Perth, Australia, April 3-7, 2017.
[pdf]
[bib]
-
Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick
Sullivan, Elie Bursztein, Michael Bailey, J. Alex Halderman, and Vern
Paxson. The Security Impact of HTTPS Interception. In the Network and
Distributed System Security Symposium 2017 (NDSS '17), San Diego,
California, February 2017.
[pdf]
[bib]
- Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon
Chuenchujit, Tim Yardley, Robin Berthier, Josh Mason, Zakir Durumeric,
J. Alex Halderman and Michael Bailey. An Internet-Wide View of ICS
Devices. In 2016 Privacy, Security and Trust Conference,
Auckland, New Zealand, December 2016.
[pdf]
[bib]
- Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir
Durumeric, Michael Bailey, and J. Alex Halderman. Towards a Complete
View of the Certificate Ecosystem. In ACM Internet Measurement
Conference 2016 (IMC '16), Santa Monica, California, November 14-16,
2016.
[pdf]
[bib]
- Zhuotao Liu, Hao Jin, Yih-Chun Hu, and Michael
Bailey. MiddlePolice: Toward Enforcing Destination-Defined Policies in
the Middle of the Internet. In Proceedings of 23rd ACM Conference on
Computer and Communications Security (CCS '16), Hofburg Palace,
Vienna, Austria, October 24-28, 2016.
[pdf]
[bib]
- Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ari Berger, Ori Folger,
Amir Hardon, Elie Bursztein, and Michael Bailey. The Abuse Sharing
Economy: Understanding the Limits of Threat Exchanges. In 19th
International Symposium on Research in Attacks, Intrusions and
Defenses (RAID '16), Evry, France, September 19-21, 2016.
[pdf]
[bib]
- Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Damon
McCoy, Stefan Savage, Michael Bailey, and Vern Paxson. You've Got
Vulnerability: Exploring Effective Vulnerability Notifications. In
25th USENIX Security Symposium (USENIX Security '16), Austin, Texas,
August 10-12, 2016
[pdf]
[bib]
- Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec
Mori, Elie Bursztein, and Michael Bailey. Users Really Do Plug in USB
Drives They Find. In IEEE Security & Privacy (Oakland) 2016
(S&P '16), San Jose, California, May 23-25, 2016.
[pdf]
[bib]
- Jakub J. Czyz, Matthew Luckie, Mark Allman, Michael Bailey. Don't
Forget to Lock the Back Door! A Characterization of IPv6 Network
Security Policy. In Proceedings of the 23rd Annual Network and
Distributed System Security Symposium (NDSS '16), San Diego,
California, February 21-24, 2016.
[pdf]
[bib]
- Zakir Durumeric, David Adrian, Ariana Mirian, Kurt Thomas, Vijay
Eranti, Nicolas Lidzborski, Elie Bursztein, Michael Bailey, J. Alex
Halderman, and James Kasten. Neither Snow Nor Rain Nor MITM: ... An
Empirical Analysis of Mail Delivery Security. In Proceedings of the
2015 Internet Measurement Conference (IMC '15), Tokyo, Japan, October
28-30, 2015.
[pdf]
[bib]
- Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey,
J. Alex Halderman. A Search Engine Backed by Internet-Wide
Scanning. In Proceedings of 22nd ACM Conference on Computer and
Communications Security (CCS '15), Denver, Colorado, October 12-16,
2015.
[pdf]
[bib]
- Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh Ardabili,
Manish Karir, Michael Bailey, Mingyan Liu. Cloudy with a Chance of
Breach: Forecasting Cyber Security Incidents. In Proceedings of the
24th USENIX Security Symposium (USENIX Security '15), Washington, DC,
August 12 - 14, 2015.
[pdf]
[bib]
- Seyed K. Fayaz, Yoshiaki Tobioka, Vyas Sekar, Michael
Bailey. Flexible and Elastic DDoS Defense using Bohatei. In
Proceedings of the 24th USENIX Security Symposium (USENIX Security
'15), Washington, DC, August 12 - 14, 2015.
[pdf]
[bib]
- Matthew Sargent, Jakub Czyz, Mark Allman, and Michael Bailey. On
The Power and Limitations of Detecting Network Filtering via Passive
Observation. In Proceedings of the 16th Passive and Active Measurement
Conference (PAM '15), New York, New York, USA, March, 2015.
[pdf]
[bib]
- Yang Liu, Jing Zhang, Armin Sarabi, Mingyan Liu, Manish Karir,
Michael Bailey. Predicting Cyber Security Incidents Using
Feature-Based Characterization of Network-Level Malicious
Activities. In International Workshop on Security and Privacy
Analytics (SPA '15), San Antonio, TX, USA, March 2015.
[pdf]
[bib]
- Zakir Durumeric, Frank Li, James Kasten, Johanna Amann, Jethro
Beekman, Mathias Payer, Nicolas Weaver, David Adrian, Vern Paxson,
Michael Bailey, and J. Alex Halderman. The Matter of Heartbleed. In
Proceedings of the 14th ACM SIGCOMM Conference on Internet Measurement
(IMC '14), Vancouver, BC, Canada, November 5-7, 2014. (Best Paper)
[pdf]
[bib]
- Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos
Papadopoulos, Michael Bailey, and Manish Karir. Taming the 800 Pound
Gorilla: The Rise and Decline of NTP DDoS Attacks. In Proceedings of
the 14th ACM SIGCOMM Conference on Internet Measurement (IMC '14),
Vancouver, BC, Canada, November 5-7, 2014.
[pdf]
[bib]
-
Zakir Durumeric, Michael Bailey, and J. Alex Halderman. An
Internet-wide View of Internet-wide Scanning. In 23rd USENIX Security
Symposium (USENIX Security '14), San Diego, California, August 20-22,
2014.
[pdf]
[bib]
-
Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric
Osterweil, and Michael Bailey. Measuring IPv6 Adoption. In ACM SIGCOMM
2014 Conference (SIGCOMM '14), Chicago, Illinois, August 17-22, 2014.
[pdf]
[bib]
-
Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric
Osterweil, and Michael Bailey. Measuring IPv6 Adoption. Technical
Report TR-13-004, International Computer Science Institute (ICSI),
Berkeley, CA, USA, August 2013
[pdf]
[bib]
-
Yunjing Xu, Zachary Musgrave, Brian Noble, Michael
Bailey. Workload-Aware Provisioning in Public Clouds. IEEE Internet
Computing 18(4):15-21, 2014.
[pdf]
[bib]
-
Erin Kenneally and Michael Bailey. Cyber-security Research Ethics
Dialogue & Strategy Workshop Report. ACM SIGCOMM Computer
Communication Review (CCR). Volume 44 Issue 2, April 2014. Pages
76-79.
[pdf]
[bib]
-
Jing Zhang, Zakir Durumeric, Michael Bailey, Manish Karir, and Mingyan
Liu. On the Mismanagement and Maliciousness of Networks. In
Proceedings of the 21st Annual Network & Distributed System Security
Symposium (NDSS '14), San Diego, California, USA, February 2014.
[pdf]
[bib]
-
D. Dittrich, M. Bailey, and E. Kenneally. Applying Ethical Principles
to Information and Communication Technology Research: A Companion to
the Menlo Report. Technical report, U.S. Department of Homeland
Security, Oct 2013.
[pdf]
[bib]
-
Yunjing Xu, Michael Bailey, Brian Noble, and Farnam Jahanian. Small is
Better: Avoiding Latency Traps in Virtualized Data Centers. In 2013
ACM Symposium on Cloud Computing (SOCC '13), Santa Clara, CA, October
2013.
[pdf]
[bib]
-
Denis Bueno, Kevin Compton, Karem Sakallah, and Michael
Bailey. Detecting Traditional Packers, Decisively. In Proceedings of
the 16th International Symposium on Research in Attacks, Intrusions
and Defenses (RAID '13), St. Lucia, October 2013.
[pdf]
[bib]
-
Jakub Czyz, Kyle Lady, Sam Miller, Michael Bailey, Michael Kallitsis,
and Manish Karir. Understanding IPv6 Internet Background Radiation. In
Proceedings of the 13th ACM SIGCOMM Conference on Internet Measurement
(IMC '13), Barcelona, Spain, October 2013.
[pdf]
[bib]
-
Zakir Durumeric, James Kasten, Michael Bailey, and J. Alex
Halderman. Security Analysis of HTTPS Usage and Certicate
Ecosystem. In Proceedings of the 13th ACM SIGCOMM Conference on
Internet Measurement (IMC '13), Barcelona, Spain, October 2013.
[pdf]
[bib]
-
Yunjing Xu, Zachary Musgrave, Brian Noble and Michael Bailey. Bobtail:
Avoiding Long Tails in the Cloud. In Proceedings of the 10th USENIX
Symposium on Networked Systems Design and Implementation (NSDI '13)
Lombard, Illinois, USA, April 2013.
[pdf]
[bib]
-
Jing Zhang, Ari Chivukula, Michael Bailey, Manish Karir, and Mingyan
Liu. Characterization of Blacklists and Tainted Network Traffic. In
Proceedings of the 14th Passive and Active Measurement Conference
(PAM '13), Hong Kong, Hong Kong, March 18 - 20, 2013.
[pdf]
[bib]
-
Andrew White, Srinivas Krishnan, Phillip Porras, Michael Bailey, and
Fabian Monrose. Clear and Present Data: Opaque Traffic and its
Security Implications for the Future. In Proceedings of the 20th
Annual Network & Distributed System Security Symposium (NDSS '13),
San Diego, California, USA, February 2013.
[pdf]
[bib]
-
Jing Zhang, Robin Berthier, William Rhee, Michael Bailey, Partha
Pal, William Sanders and Farnam Jahanian. Safeguarding Academic
Accounts and Resources with the University Credential Abuse Auditing
System. In Proceedings of the 42nd Annual IEEE International
Conference on Dependable Systems and Networks (DSN '12), Boston,
Massachusetts, USA, June 25 - 28, 2012.
[pdf]
[bib]
-
Jing Zhang, Robin Berthier, William Rhee, Michael Bailey, Partha
Pal, William Sanders, Farnam Jahanian. Learning From Early Attempts
To Measure Information Security Performance. In Proceedings of the
5th Workshop on Cyber Security Experimentation and Test (CSET '12),
Bellevue, WA, USA, August 2012.
[pdf]
[bib]
-
Michael Bailey, David Dittrich, Erin Kenneally, Doug
Maughan. The Menlo Report. IEEE Security and Privacy 10(2):71-75,
2012.
[pdf]
[bib]
-
Erin Kenneally, Michael Bailey, and David Dittrich. A Refined
Ethical Impact Assessment Tool and a Case Study of its
Application. In Workshop on Ethics in Computer Security Research
(WECSR '12), Bonaire, Netherlands, 2012.
[pdf]
[bib]
-
Yunjing Xu, Michael Bailey, Farnam Jahanian, Kaustubh Joshi, Matti
Hiltunen, and Richard Schlichting. An Exploration of L2 Cache Covert
Channels in Virtualized Environments. In 3rd ACM Cloud Computing
Security Workshop (CCSW '11), pages 29-40, Chicago, IL, USA, October
2011.
[pdf]
[bib]
-
David Dittrich, Michael Bailey, Sven Dietrich. Building an Active
Computer Security Ethics Community. IEEE Security and Privacy,
9(4):18-26, 2011.
[pdf]
[bib]
-
Michael Bailey and Craig Labovitz. Censorship and Co-option of the
Internet Infrastructure. Technical Report CSE-TR-572-11, University of
Michigan, Ann Arbor, MI, USA, July 2011.
[pdf]
[bib]
-
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey, and Farnam
Jahanian. A Comparative Study of Two Network-based Anomaly Detection
Methods. In (mini-conference) The 30th IEEE International Conference
on Computer Communications (INFOCOM '11), Shanghai, China, April
2011.
[pdf]
[bib]
-
Scott Coull, Fabian Monrose, and Michael Bailey. On Measuring the
Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical
Analyses. In Proceedings of the 18th Annual Network & Distributed
System Security Symposium (NDSS '11), San Diego, California, USA,
February 2011.
[pdf]
[bib]
-
Yunjing Xu, Michael Bailey, Eric Vander Weele, and Farnam
Jahanian. CANVuS: Context-Aware Network Vulnerability Scanning. In
Proceedings of the 13th International Symposium on Recent Advances in
Intrusion Detection (RAID '10), Ottawa, Ontario, Canada, September
2010.
[pdf]
[bib]
-
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff
Houston. Internet Background Radiation Revisited. In Proceedings of
the 10th ACM SIGCOMM Conference on Internet Measurement (IMC '10),
Melbourne, Australia, November 2010.
[pdf]
[bib]
-
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff Houston. Internet Background Radiation
Revisited. Technical Report CSE-TR-564-10, University of Michigan, Ann Arbor, MI, USA, June 2010.
-
Sushant Sinha, Michael Bailey, and Farnam Jahanian. Improving SPAM Blacklisting through Dynamic Thresholding
and Speculative Aggregation. In Proceedings of the 17th Annual Network & Distributed System Security
Symposium (NDSS '10), San Diego, California, USA, February-March 2010.
[pdf]
[bib]
-
Erin Kenneally, Michael Bailey, and Douglas Maughan. A Framework for Understanding and Applying Ethical Principles in Network and Security Research. In Workshop on Ethics in Computer Security Research (WECSR '10), Tenerife, Canary Islands, Spain, January 2010.
[pdf]
[bib]
-
David Dittrich, Michael Bailey, Sven Dietrich. Towards Community Standards for Ethical Behavior in Computer Security Research. Stevens CS Technical Report 2009-1, 20 April 2009.
[pdf]
[bib]
-
David Dittrich, Michael Bailey, and Sven Dietrich. Have we Crossed the Line? The Growing Ethical Debate
in Modern Computer Security Research. In (Poster at) Proceedings of the 16th ACM Conference on Computer
and Communication Security (CCS '09), Chicago, Illinois USA, November 2009
[pdf]
[bib]
-
Jon Oberheide, Michael Bailey, and Farnam Jahanian. PolyPack: An Automated Online Packing Service for
Optimal Antivirus Evasion. In 3rd USENIX Workshop on Offensive Technologies (WOOT '09), Montreal, Canada,
August 2009.
[pdf]
[bib]
-
Sushant Sinha, Michael Bailey, and Farnam Jahanian. One Size Does Not Fit All: 10 Years of Applying Context Aware Security. In Proceedings of the 2009 IEEE International Conference on Technologies for Homeland Security (HST '09), Waltham, Massachusetts, USA, May 2009.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu, and Manish Karir. A Survey of Botnet Technology and Defenses. In Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH '09), pages 299-304, Washington, District of Columbia, USA, March 2009.
[pdf]
[bib]
-
Scott E. Coull, Fabian Monrose, Michael K. Reiter, and Michael Bailey. The Challenges of Effectively Anonymizing Network Data. In Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH '09), pages 230-236, Washington, District of Columbia, USA, March 2009.
[pdf]
[bib]
-
Sushant Sinha, Michael Bailey, and Farnam Jahanian. Shades of Grey: On the Effectiveness of Reputation-based blacklists. In Proceedings of the 3rd International Conference on Malicious and Unwanted Software (MALWARE '08), pages 57-64, Fairfax, Virginia, USA, October 2008.
[pdf]
[bib]
-
Xu Chen, Jon Andersen, Z. Morley Mao, Michael Bailey, and Jose Nazario. Towards an Understanding of Anti-Virtualization and Anti-Debugging Behavior in Modern Malware. In Proceedings of the 38th Annual IEEE International Conference on Dependable Systems and Networks (DSN '08), pages 177-186, Anchorage, Alaska, USA, June 2008.
[pdf]
[bib]
-
Sushant Sinha, Michael Bailey, and Farnam Jahanian. Shedding Light on the Configuration of Dark Addresses. In Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS '07), pages 125-139, San Diego, California, USA, February-March 2007.
[pdf]
[bib]
-
Michael Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, and Jose Nazario. Automated Classification and Analysis of Internet Malware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID '07), pages 178-197, Gold Coast, Australia, September 2007.
[pdf]
[bib]
-
Michael Donald Bailey. A Scalable Hybrid Network Monitoring Architecture for Measuring, Characterizing, and Tracking Internet Threat Dynamics. PhD thesis, University of Michigan, Ann Arbor, MI, USA, 2006.
[pdf]
[bib]
-
Evan Cooke, Michael Bailey, Farnam Jahanian, and Richard Mortier. The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery. In Proceedings of the 3rd Symposium on Networked Systems Design & Implementation (NSDI '06), pages 101-114, San Jose, California, USA, May 2006.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Andrew Myrick, and Sushant Sinha. Practical Darknet Measurement. In Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS '06), pages 1496-1501, Princeton, New Jersey, USA, March 2006.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, and Jose Nazario. The Blaster Worm: Then and Now. IEEE Security and Privacy, 3(4):26-31, 2005.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, and David Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05), pages 239-252, Berkeley, California, USA, October 2005.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, Farnam Jahanian, and Jose Nazario. The Internet Motion Sensor - A Distributed Blackhole Monitoring System. In Proceedings of the 12th Annual Network & Distributed System Security Symposium (NDSS '05), pages 167-179, San Diego, California, USA, February 2005.
[pdf]
[bib]
-
Michael Bailey, Evan Cooke, David Watson, Farnam Jahanian, and Niels Provos. A Hybrid Honeypot Architecture for Scalable Network Monitoring. Technical Report CSE-TR-499-04, University of Michigan, Ann Arbor, Michigan, USA, October 2004.
[pdf]
[bib]
-
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, Farnam Jahanian, and Danny McPherson. Toward Understanding Distributed Blackhole Placement. In Proceedings of the 2nd Workshop on Rapid Malcode (WORM '04), pages 54-64, Washington, District of Columbia, USA, October 2004.
[pdf]
[bib]
-
Michael Bailey, Farnam Jahanian, G. Robert Malan, Jose Nazario, Dug Song, and Robert Stone. Measuring, Characterizing, and Tracking Internet Threat Dynamics. In Proceedings of the OpenSig 2003 Workshop (OpenSig '03), New York, New York, USA, October 2003.
[pdf]
[bib]
-
Craig Labovitz, Abha Ahuja, and Michael Bailey. Shining light on dark address space. Technical Report TR-2001-01, Arbor Netwoks, Ann Arbor, Michigan, USA, November 2001.
[pdf]
[bib]
Contact Information
Email
mbailey AT gatech DOT edu
U.S. Mail Address:
756 West Peachtree Street NW
Atlanta, GA 30308-4016