Biblio

Export 14 results:
Filters: Author is Michael Bailey  [Clear All Filters]
2021
Kumar D, Kelley PGage, Consolvo S, Mason J, Bursztein E, Durumeric Z, Thomas K, Bailey M.  2021.  Designing Toxic Content Classification for a Diversity of Perspectives. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :299--318.
Ma Z, Mason J, Antonakakis M, Durumeric Z, Bailey M.  2021.  What's in a Name? Exploring CA Certificate Control 30th USENIX Security Symposium (USENIX Security 21). :4383--4400.
2020
Reynolds J, Samarin N, Barnes J, Judd T, Mason J, Bailey M, Egelman S.  2020.  Empirical Measurement of Systemic 2FA Usability. 29th USENIX Security Symposium (USENIX Security 20). :127--143.
2019
Ma Z, Reynolds J, Dickinson J, Wang K, Judd T, Barnes JD, Mason J, Bailey M.  2019.  The Impact of Secure Transport Protocols on Phishing Efficacy. 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19).
2018
Zhou Y, Kumar D, Bakshi S, Mason J, Miller A, Bailey M.  2018.  Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. 27th USENIX Security Symposium (USENIX Security 18). :1371--1385.
Kumar D, Paccagnella R, Murley P, Hennenfent E, Mason J, Bates A, Bailey M.  2018.  Skill Squatting Attacks on Amazon Alexa. 27th USENIX Security Symposium (USENIX Security 18). :33--47.
2017
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, J. Halderman A, Invernizzi L, Kallitsis M et al..  2017.  Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). :1093--1110.
2015
Fayaz SK, Tobioka Y, Sekar V, Bailey M.  2015.  Bohatei: Flexible and Elastic DDoS Defense. 24th {USENIX} Security Symposium ({USENIX} Security 15). :817--832.
Liu Y, Sarabi A, Zhang J, Naghizadeh P, Karir M, Bailey M, Liu M.  2015.  Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. 24th {USENIX} Security Symposium ({USENIX} Security 15). :1009--1024.
2014
Durumeric Z, Bailey M, J. Halderman A.  2014.  An Internet-Wide View of Internet-Wide Scanning. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :65--78.
2013
Xu Y, Musgrave Z, Noble B, Bailey M.  2013.  Bobtail: Avoiding Long Tails in the Cloud. 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). :329--341.
2006
Cooke E, Bailey M, Jahanian F, Mortier R.  2006.  The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery . 3rd Symposium on Networked Systems Design & Implementation ({NSDI} 06).