Losing control of the internet: using the data plane to attack the control plane M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 155 | 2010 |
Routing around decoys M Schuchard, J Geddes, C Thompson, N Hopper Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 112 | 2012 |
Cover your acks: Pitfalls of covert channel censorship circumvention J Geddes, M Schuchard, N Hopper Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 106 | 2013 |
Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing JM Smith, M Schuchard 2018 IEEE Symposium on Security and Privacy (SP), 599-617, 2018 | 102 | 2018 |
{PKU} pitfalls: Attacks on {PKU-based} memory isolation systems E Connor, T McDaniel, JM Smith, M Schuchard 29th USENIX Security Symposium (USENIX Security 20), 1409-1426, 2020 | 79 | 2020 |
Protecting access privacy of cached contents in information centric networks A Mohaisen, X Zhang, M Schuchard, H Xie, Y Kim Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 72 | 2013 |
Balancing the shadows M Schuchard, AW Dean, V Heorhiadi, N Hopper, Y Kim Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010 | 29 | 2010 |
Withdrawing the bgp re-routing curtain: Understanding the security impact of bgp poisoning through real-world measurements JM Smith, K Birkeland, T McDaniel, M Schuchard Proceedings 2020 Network and Distributed System Security Symposium, 2020 | 25 | 2020 |
Flexsealing BGP against route leaks: peerlock active measurement and analysis T McDaniel, JM Smith, M Schuchard arXiv preprint arXiv:2006.06576, 2020 | 14 | 2020 |
Secure encounter-based social networks: requirements, challenges, and designs A Mohaisen, EY Vasserman, M Schuchard, D Foo Kune, Y Kim Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 13 | 2010 |
An Internet-scale feasibility study of BGP poisoning as a security primitive JM Smith, K Birkeland, M Schuchard arXiv preprint arXiv:1811.03716 23, 36, 2018 | 9* | 2018 |
Peer pressure: Exerting malicious influence on routers at a distance M Schuchard, C Thompson, N Hopper, Y Kim 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 8 | 2013 |
Withdrawing the bgp re-routing curtain JM Smith, K Birkeland, T McDaniel, M Schuchard Network and Distributed System Security Symposium (NDSS), 2020 | 6 | 2020 |
Nation scale mobile ad hoc network for normally isolated topologies S Oesch, M Schuchard 2019 international conference on internet of things (iThings) and IEEE green …, 2019 | 5 | 2019 |
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. M Schuchard, C Thompson, N Hopper, Y Kim NDSS, 2012 | 5 | 2012 |
Taking routers off their meds: Unstable routers and the buggy bgp implementations that cause them M Schuchard, C Thompson, NJ Hopper, Y Kim | 5 | 2011 |
Blind Bernoulli Trials: A Noninteractive Protocol For {Hidden-Weight} Coin Flips E Connor, M Schuchard 28th USENIX Security Symposium (USENIX Security 19), 1483-1500, 2019 | 4 | 2019 |
Losing control of the internet M Schuchard, A Mohaisen, DF Kune, N Hopper, Y Kim, EY Vasserman Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010 | 4 | 2010 |
The maestro attack: Orchestrating malicious flows with bgp T McDaniel, JM Smith, M Schuchard Security and Privacy in Communication Networks: 16th EAI International …, 2020 | 3 | 2020 |
Measuring Irregular Geographic Exposure on the Internet J Holland, J Smith, M Schuchard arXiv preprint arXiv:1904.09375, 2019 | 2 | 2019 |