Publications
(2013). Practical Comprehensive Bounds on Surreptitious Communication Over DNS.
SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
(2012). Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
(2012). Manufacturing Compromise: The Emergence of Exploit-as-a-Service.
821-832.
(2011). Click Trajectories: End-to-End Analysis of the Spam Value Chain.
431-446.
(2011). Computing TCP's Retransmission Timer.
(2011). Design and Evaluation of a Real-Time URL Spam Filtering Service.
447-464.

]