Publications
 
 (2003).  Inside the Slammer Worm.  
IEEE Magazine of Security and Privacy. 1(4), 33-39.
 
 (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic.  
Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).  
 
 (2008).  On the Spam Campaign Trail.  
 
 
 (2009).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion.  
52(9), 99-107.
 
 (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain.  
 431-446.
 
 (2012).  Manufacturing Compromise: The Emergence of Exploit-as-a-Service.  
 821-832.
 
 (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods.  
 845-856.
 
 (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.  
Proceedings of the 25th USENIX Security Symposium.  
 
 (2021).  Hopper: Modeling and Detecting Lateral Movement.  
Proceedings of the 30th USENIX Security Symposium.  3093-3110.

 ]
]