default search action
Michael D. Bailey
Person information
- affiliation: Georgia Institute of Technology, Atlanta, GA, USA
- affiliation (former): University of Illinois Urbana-Champaign, IL, USA
Other persons with a similar name
- Michael Bailey
- Michael A. Bailey
- Michael C. Bailey
- Michael G. Bailey
- Michael J. Bailey
- Michael P. Bailey (aka: Michael Page Bailey)
- Michael R. Bailey
- Christopher Bailey 0003 (aka: Christopher Michael Bailey) — University of Kent, UK
- Michael Bailey-Van Kuren
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c67]Zane Ma, Aaron Faulkenberry, Thomas Papastergiou, Zakir Durumeric, Michael D. Bailey, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis:
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys. IMC 2023: 222-235 - 2022
- [c66]Joshua Reynolds, Adam Bates, Michael D. Bailey:
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations. ESORICS (3) 2022: 166-185 - 2021
- [c65]Zane Ma, James Austgen, Joshua Mason, Zakir Durumeric, Michael D. Bailey:
Tracing your roots: exploring the TLS trust anchor ecosystem. Internet Measurement Conference 2021: 179-194 - [c64]Rishabh Chhabra, Paul Murley, Deepak Kumar, Michael D. Bailey, Gang Wang:
Measuring DNS-over-HTTPS performance around the world. Internet Measurement Conference 2021: 351-365 - [c63]Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:
Designing Toxic Content Classification for a Diversity of Perspectives. SOUPS @ USENIX Security Symposium 2021: 299-318 - [c62]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c61]Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael D. Bailey:
What's in a Name? Exploring CA Certificate Control. USENIX Security Symposium 2021: 4383-4400 - [c60]Paul Murley, Zane Ma, Joshua Mason, Michael D. Bailey, Amin Kharraz:
WebSocket Adoption and the Landscape of the Real-Time Web. WWW 2021: 1192-1203 - [e4]Michael D. Bailey, Rachel Greenstadt:
30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021. USENIX Association 2021, ISBN 978-1-939133-24-3 [contents] - [i3]Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:
Designing Toxic Content Classification for a Diversity of Perspectives. CoRR abs/2106.04511 (2021) - 2020
- [c59]Joshua Reynolds, Deepak Kumar, Zane Ma, Rohan Subramanian, Meishan Wu, Martin Shelton, Joshua Mason, Emily Stark, Michael D. Bailey:
Measuring Identity Confusion with Uniform Resource Locators. CHI 2020: 1-12 - [c58]Joshua Reynolds, Nikita Samarin, Joseph D. Barnes, Taylor Judd, Joshua Mason, Michael D. Bailey, Serge Egelman:
Empirical Measurement of Systemic 2FA Usability. USENIX Security Symposium 2020: 127-143
2010 – 2019
- 2019
- [j8]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Emerging Threats in Internet of Things Voice Services. IEEE Secur. Priv. 17(4): 18-24 (2019) - [c57]Zane Ma, Joshua Reynolds, Joseph Dickinson, Kaishen Wang, Taylor Judd, Joseph D. Barnes, Joshua Mason, Michael D. Bailey:
The Impact of Secure Transport Protocols on Phishing Efficacy. CSET @ USENIX Security Symposium 2019 - [c56]Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov, Manos Antonakakis, Michael D. Bailey:
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild. WWW 2019: 840-852 - 2018
- [j7]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control. IEEE/ACM Trans. Netw. 26(4): 1948-1961 (2018) - [c55]Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, Michael D. Bailey:
Measuring Ethereum Network Peers. Internet Measurement Conference 2018: 91-104 - [c54]Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
Tracking Certificate Misissuance in the Wild. IEEE Symposium on Security and Privacy 2018: 785-798 - [c53]Jing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael D. Bailey, Adam Bates, Kevin R. B. Butler:
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. IEEE Symposium on Security and Privacy 2018: 1032-1047 - [c52]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Skill Squatting Attacks on Amazon Alexa. USENIX Security Symposium 2018: 33-47 - [c51]Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael D. Bailey:
Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. USENIX Security Symposium 2018: 1371-1385 - [e3]Michael D. Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis:
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings. Lecture Notes in Computer Science 11050, Springer 2018, ISBN 978-3-030-00469-9 [contents] - 2017
- [j6]Matthew Tischer, Zakir Durumeric, Elie Bursztein, Michael D. Bailey:
The Danger of USB Drives. IEEE Secur. Priv. 15(2): 62-69 (2017) - [c50]Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael D. Bailey, J. Alex Halderman, Vern Paxson:
The Security Impact of HTTPS Interception. NDSS 2017 - [c49]Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - [c48]Deepak Kumar, Zane Ma, Zakir Durumeric, Ariana Mirian, Joshua Mason, J. Alex Halderman, Michael D. Bailey:
Security Challenges in an Increasingly Tangled Web. WWW 2017: 677-684 - [e2]Marc Dacier, Michael D. Bailey, Michalis Polychronakis, Manos Antonakakis:
Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings. Lecture Notes in Computer Science 10453, Springer 2017, ISBN 978-3-319-66331-9 [contents] - [i2]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation. CoRR abs/1709.05710 (2017) - 2016
- [c47]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet. CCS 2016: 1268-1279 - [c46]Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael D. Bailey, J. Alex Halderman:
Towards a Complete View of the Certificate Ecosystem. Internet Measurement Conference 2016: 543-549 - [c45]Jakub Czyz, Matthew J. Luckie, Mark Allman, Michael D. Bailey:
Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. NDSS 2016 - [c44]Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
An Internet-wide view of ICS devices. PST 2016: 96-103 - [c43]Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey:
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. RAID 2016: 143-164 - [c42]Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec Mori, Elie Bursztein, Michael D. Bailey:
Users Really Do Plug in USB Drives They Find. IEEE Symposium on Security and Privacy 2016: 306-319 - [c41]Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. USENIX Security Symposium 2016: 1033-1050 - 2015
- [c40]Zakir Durumeric, David Adrian, Ariana Mirian, Michael D. Bailey, J. Alex Halderman:
A Search Engine Backed by Internet-Wide Scanning. CCS 2015: 542-553 - [c39]Yang Liu, Jing Zhang, Armin Sarabi, Mingyan Liu, Manish Karir, Michael D. Bailey:
Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities. IWSPA@CODASPY 2015: 3-9 - [c38]Qiao Jin, Jiayi Duan, Shobha Vasudevan, Michael D. Bailey:
Packer classifier based on PE header information. HotSoS 2015: 19:1-19:2 - [c37]Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael D. Bailey, J. Alex Halderman:
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security. Internet Measurement Conference 2015: 27-39 - [c36]Matthew Sargent, Jakub Czyz, Mark Allman, Michael D. Bailey:
On the Power and Limitations of Detecting Network Filtering via Passive Observation. PAM 2015: 165-178 - [c35]Seyed Kaveh Fayaz, Yoshiaki Tobioka, Vyas Sekar, Michael D. Bailey:
Bohatei: Flexible and Elastic DDoS Defense. USENIX Security Symposium 2015: 817-832 - [c34]Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael D. Bailey, Mingyan Liu:
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. USENIX Security Symposium 2015: 1009-1024 - [i1]Seyed Kaveh Fayaz, Yoshiaki Tobioka, Vyas Sekar, Michael D. Bailey:
Bohatei: Flexible and Elastic DDoS Defense. CoRR abs/1506.08501 (2015) - 2014
- [j5]Erin Kenneally, Michael D. Bailey:
Cyber-security research ethics dialogue & strategy workshop. Comput. Commun. Rev. 44(2): 76-79 (2014) - [j4]Yunjing Xu, Zachary Musgrave, Brian Noble, Michael D. Bailey:
Workload-Aware Provisioning in Public Clouds. IEEE Internet Comput. 18(4): 15-21 (2014) - [c33]Jakub Czyz, Michael G. Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael D. Bailey, Manish Karir:
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks. Internet Measurement Conference 2014: 435-448 - [c32]Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael D. Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:
The Matter of Heartbleed. Internet Measurement Conference 2014: 475-488 - [c31]Jing Zhang, Zakir Durumeric, Michael D. Bailey, Mingyan Liu, Manish Karir:
On the Mismanagement and Maliciousness of Networks. NDSS 2014 - [c30]Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric Osterweil, Michael D. Bailey:
Measuring IPv6 adoption. SIGCOMM 2014: 87-98 - [c29]Zakir Durumeric, Michael D. Bailey, J. Alex Halderman:
An Internet-Wide View of Internet-Wide Scanning. USENIX Security Symposium 2014: 65-78 - 2013
- [c28]Yunjing Xu, Michael D. Bailey, Brian Noble, Farnam Jahanian:
Small is better: avoiding latency traps in virtualized data centers. SoCC 2013: 7:1-7:16 - [c27]Jakub Czyz, Kyle Lady, Sam G. Miller, Michael D. Bailey, Michael G. Kallitsis, Manish Karir:
Understanding IPv6 internet background radiation. Internet Measurement Conference 2013: 105-118 - [c26]Zakir Durumeric, James Kasten, Michael D. Bailey, J. Alex Halderman:
Analysis of the HTTPS certificate ecosystem. Internet Measurement Conference 2013: 291-304 - [c25]Andrew M. White, Srinivas Krishnan, Michael D. Bailey, Fabian Monrose, Phillip A. Porras:
Clear and Present Data: Opaque Traffic and its Security Implications for the Future. NDSS 2013 - [c24]Yunjing Xu, Zachary Musgrave, Brian Noble, Michael D. Bailey:
Bobtail: Avoiding Long Tails in the Cloud. NSDI 2013: 329-341 - [c23]Jing Zhang, Ari Chivukula, Michael D. Bailey, Manish Karir, Mingyan Liu:
Characterization of Blacklists and Tainted Network Traffic. PAM 2013: 218-228 - [c22]Manish Karir, Geoff Huston, George Michaelson, Michael D. Bailey:
Understanding IPv6 Populations in the Wild. PAM 2013: 256-259 - [c21]Denis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael D. Bailey:
Detecting Traditional Packers, Decisively. RAID 2013: 184-203 - 2012
- [j3]Michael D. Bailey, David Dittrich, Erin Kenneally, Douglas Maughan:
The Menlo Report. IEEE Secur. Priv. 10(2): 71-75 (2012) - [c20]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. DSN 2012: 1-8 - [c19]Michael D. Bailey, Erin Kenneally, David Dittrich:
A Refined Ethical Impact Assessment Tool and a Case Study of Its Application. Financial Cryptography Workshops 2012: 112-123 - [c18]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Learning from Early Attempts to Measure Information Security Performance. CSET 2012 - 2011
- [j2]David Dittrich, Michael D. Bailey, Sven Dietrich:
Building an Active Computer Security Ethics Community. IEEE Secur. Priv. 9(4): 32-40 (2011) - [c17]Yunjing Xu, Michael D. Bailey, Farnam Jahanian, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting:
An exploration of L2 cache covert channels in virtualized environments. CCSW 2011: 29-40 - [c16]Kaustubh Nyalkalkar, Sushant Sinha, Michael D. Bailey, Farnam Jahanian:
A comparative study of two network-based anomaly detection methods. INFOCOM 2011: 176-180 - [c15]Scott E. Coull, Fabian Monrose, Michael D. Bailey:
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses. NDSS 2011 - 2010
- [c14]Erin Kenneally, Michael D. Bailey, Douglas Maughan:
A Framework for Understanding and Applying Ethical Principles in Network and Security Research. Financial Cryptography Workshops 2010: 240-246 - [c13]Eric Wustrow, Manish Karir, Michael D. Bailey, Farnam Jahanian, Geoff Huston:
Internet background radiation revisited. Internet Measurement Conference 2010: 62-74 - [c12]Sushant Sinha, Michael D. Bailey, Farnam Jahanian:
Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation. NDSS 2010 - [c11]Yunjing Xu, Michael D. Bailey, Eric Vander Weele, Farnam Jahanian:
CANVuS: Context-Aware Network Vulnerability Scanning. RAID 2010: 138-157 - [e1]Michael D. Bailey:
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '10, San Jose, CA, USA, April 27, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [c10]Jon Oberheide, Michael D. Bailey, Farnam Jahanian:
PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion. WOOT 2009: 1-6 - 2008
- [c9]Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario:
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. DSN 2008: 177-186 - [c8]Sushant Sinha, Michael D. Bailey, Farnam Jahanian:
Shades of grey: On the effectiveness of reputation-based "blacklists". MALWARE 2008: 57-64 - 2007
- [c7]Sushant Sinha, Michael D. Bailey, Farnam Jahanian:
Shedding Light on the Configuration of Dark Addresses. NDSS 2007 - [c6]Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario:
Automated Classification and Analysis of Internet Malware. RAID 2007: 178-197 - 2006
- [c5]Michael D. Bailey, Evan Cooke, Farnam Jahanian, Andrew Myrick, Sushant Sinha:
Practical Darknet Measurement. CISS 2006: 1496-1501 - [c4]Evan Cooke, Michael D. Bailey, Farnam Jahanian, Richard Mortier:
The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery. NSDI 2006 - 2005
- [j1]Michael D. Bailey, Evan Cooke, Farnam Jahanian, David Watson, Jose Nazario:
The Blaster Worm: Then and Now. IEEE Secur. Priv. 3(4): 26-31 (2005) - [c3]Michael D. Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson:
Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. Internet Measurement Conference 2005: 239-252 - [c2]Michael D. Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario:
The Internet Motion Sensor - A Distributed Blackhole Monitoring System. NDSS 2005 - 2004
- [c1]Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson, Farnam Jahanian, Danny McPherson:
Toward understanding distributed blackhole placement. WORM 2004: 54-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-05 23:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint