Michael Bailey

Results: 183



#Item
1Linguistics / Phonetics / Phonology / Human communication / Human behavior / Language / Computer accessibility / Speech recognition / Amazon Alexa / Phoneme / Amazon Echo / Alexa

Skill Squatting Attacks on Amazon Alexa Deepak Kumar Riccardo Paccagnella Paul Murley Eric Hennenfent Joshua Mason Adam Bates Michael Bailey University of Illinois Urbana-Champaign Abstract

Add to Reading List

Source URL: kumarde.com

Language: English - Date: 2018-08-16 10:08:06
2Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis⇧ Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi Michalis Kallitsis§ Deepak Kumar†

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-01-19 09:59:23
3Cryptocurrencies / Blockchains / Ethereum / Alternative currencies / Concurrent computing / Computing / Distributed computing / Cross-platform software / Smart contract / Solidity / ERC-20 / CryptoKitties

Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts Yi Zhou Deepak Kumar Surya Bakshi Joshua Mason Andrew Miller Michael Bailey University of Illinois, Urbana-Champaign Abstract Interacting with Ethereum smart

Add to Reading List

Source URL: kumarde.com

Language: English - Date: 2018-08-16 10:08:06
4Botnets / Computing / Cybercrime / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein◦ Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi◦ Michalis Kallitsis§ Deepak Kumar

Add to Reading List

Source URL: mbernhard.com

Language: English - Date: 2017-08-15 20:35:58
5

Detecting Traditional Packers, Decisively Denis Bueno, Kevin J. Compton, Karem A. Sakallah, and Michael Bailey Electrical Engineering and Computer Science Department University of Michigan {dlbueno,kjc,karem,mibailey}@um

Add to Reading List

Source URL: nsrg.ece.illinois.edu

Language: English - Date: 2018-06-11 12:51:20
    6

    Understanding IPv6 Internet Background Radiation Jakub Czyz, Kyle Lady, Sam G. Miller, Michael Bailey University of Michigan Ann Arbor, MI

    Add to Reading List

    Source URL: nsrg.ece.illinois.edu

    Language: English - Date: 2018-06-11 12:51:20
      7USB / Computer hardware / Computing / Computer data storage / Thunderbolt / Firmware / USB human interface device class / KVM switch

      SoK: “Plug & Pray” Today – Understanding USB Insecurity in Versions 1 through C Dave (Jing) Tian∗ , Nolen Scaife∗ , Deepak Kumar† , Michael Bailey† , Adam Bates† , Kevin R. B. Butler∗ ∗ University of

      Add to Reading List

      Source URL: oaklandsok.github.io

      Language: English - Date: 2018-03-14 15:33:55
      8

      Understanding the Mirai Botnet Manos Antonakakis Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein◦ Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi◦ Michalis Kallitsis§ Deepak Kumar

      Add to Reading List

      Source URL: nsrg.ece.illinois.edu

      Language: English - Date: 2018-06-11 12:51:20
        9

        Understanding the Mirai Botnet Manos Antonakakis Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein◦ Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi◦ Michalis Kallitsis§ Deepak Kumar

        Add to Reading List

        Source URL: joshm.web.engr.illinois.edu

        Language: English - Date: 2017-08-19 23:51:27
          UPDATE