Export 14 results:
Filters: Author is Michael Bailey  [Clear All Filters]
Kumar D, Kelley PGage, Consolvo S, Mason J, Bursztein E, Durumeric Z, Thomas K, Bailey M.  2021.  Designing Toxic Content Classification for a Diversity of Perspectives. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :299--318.
Ma Z, Mason J, Antonakakis M, Durumeric Z, Bailey M.  2021.  What's in a Name? Exploring CA Certificate Control 30th USENIX Security Symposium (USENIX Security 21). :4383--4400.
Reynolds J, Samarin N, Barnes J, Judd T, Mason J, Bailey M, Egelman S.  2020.  Empirical Measurement of Systemic 2FA Usability. 29th USENIX Security Symposium (USENIX Security 20). :127--143.
Ma Z, Reynolds J, Dickinson J, Wang K, Judd T, Barnes JD, Mason J, Bailey M.  2019.  The Impact of Secure Transport Protocols on Phishing Efficacy. 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19).
Zhou Y, Kumar D, Bakshi S, Mason J, Miller A, Bailey M.  2018.  Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. 27th USENIX Security Symposium (USENIX Security 18). :1371--1385.
Kumar D, Paccagnella R, Murley P, Hennenfent E, Mason J, Bates A, Bailey M.  2018.  Skill Squatting Attacks on Amazon Alexa. 27th USENIX Security Symposium (USENIX Security 18). :33--47.
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, J. Halderman A, Invernizzi L, Kallitsis M et al..  2017.  Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). :1093--1110.
Fayaz SK, Tobioka Y, Sekar V, Bailey M.  2015.  Bohatei: Flexible and Elastic DDoS Defense. 24th USENIX Security Symposium (USENIX Security 15). :817--832.
Liu Y, Sarabi A, Zhang J, Naghizadeh P, Karir M, Bailey M, Liu M.  2015.  Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. 24th USENIX Security Symposium (USENIX Security 15). :1009--1024.
Durumeric Z, Bailey M, J. Halderman A.  2014.  An Internet-Wide View of Internet-Wide Scanning. 23rd USENIX Security Symposium (USENIX Security 14). :65--78.
Xu Y, Musgrave Z, Noble B, Bailey M.  2013.  Bobtail: Avoiding Long Tails in the Cloud. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :329--341.
Cooke E, Bailey M, Jahanian F, Mortier R.  2006.  The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery . 3rd Symposium on Networked Systems Design & Implementation (NSDI 06).