Publications
(2021). Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium. 3093-3110.
(2016). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2012). Manufacturing Compromise: The Emergence of Exploit-as-a-Service.
821-832.
(2012). Priceless: The Role of Payments in Abuse-Advertised Goods.
845-856.
(2011). Click Trajectories: End-to-End Analysis of the Spam Value Chain.
431-446.
(2009). Spamalytics: An Empirical Analysis of Spam Marketing Conversion.
52(9), 99-107.
(2008). On the Spam Campaign Trail.
(2005). Opportunistic Measurement: Extracting Insight from Spurious Traffic.
Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
(2003). Inside the Slammer Worm.
IEEE Magazine of Security and Privacy. 1(4), 33-39.

]