| Losing control of the internet: using the data plane to attack the control plane M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 159 | 2010 |
| Routing around decoys M Schuchard, J Geddes, C Thompson, N Hopper Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 117 | 2012 |
| Cover your ACKs: Pitfalls of covert channel censorship circumvention J Geddes, M Schuchard, N Hopper Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 112 | 2013 |
| Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing JM Smith, M Schuchard 2018 IEEE Symposium on Security and Privacy (SP), 599-617, 2018 | 110 | 2018 |
| {PKU} pitfalls: Attacks on {PKU-based} memory isolation systems E Connor, T McDaniel, JM Smith, M Schuchard 29th USENIX Security Symposium (USENIX Security 20), 1409-1426, 2020 | 106 | 2020 |
| Protecting access privacy of cached contents in information centric networks A Mohaisen, X Zhang, M Schuchard, H Xie, Y Kim Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 74 | 2013 |
| Balancing the shadows M Schuchard, AW Dean, V Heorhiadi, N Hopper, Y Kim Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010 | 31 | 2010 |
| Withdrawing the bgp re-routing curtain: Understanding the security impact of bgp poisoning through real-world measurements JM Smith, K Birkeland, T McDaniel, M Schuchard Proceedings 2020 Network and Distributed System Security Symposium, 2020 | 22 | 2020 |
| Flexsealing BGP against route leaks: peerlock active measurement and analysis T McDaniel, JM Smith, M Schuchard arXiv preprint arXiv:2006.06576, 2020 | 18 | 2020 |
| Secure encounter-based social networks: requirements, challenges, and designs A Mohaisen, EY Vasserman, M Schuchard, D Foo Kune, Y Kim Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 13 | 2010 |
| An Internet-scale feasibility study of BGP poisoning as a security primitive JM Smith, K Birkeland, M Schuchard arXiv preprint arXiv:1811.03716 23, 36, 2018 | 10* | 2018 |
| Fuzzbomb: Autonomous cyber vulnerability detection and repair DJ Musliner, SE Friedman, M Boldt, J Benton, M Schuchard, P Keller, ... Fourth International Conference on Communications, Computation, Networks and …, 2015 | 9 | 2015 |
| Peer pressure: Exerting malicious influence on routers at a distance M Schuchard, C Thompson, N Hopper, Y Kim 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 8 | 2013 |
| Withdrawing the bgp re-routing curtain JM Smith, K Birkeland, T McDaniel, M Schuchard Network and Distributed System Security Symposium (NDSS), 2020 | 7 | 2020 |
| Nation scale mobile ad hoc network for normally isolated topologies S Oesch, M Schuchard 2019 international conference on internet of things (iThings) and IEEE green …, 2019 | 5 | 2019 |
| Blind Bernoulli Trials: A Noninteractive Protocol For {Hidden-Weight} Coin Flips E Connor, M Schuchard 28th USENIX Security Symposium (USENIX Security 19), 1483-1500, 2019 | 5 | 2019 |
| Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. M Schuchard, C Thompson, N Hopper, Y Kim NDSS, 2012 | 5 | 2012 |
| The maestro attack: Orchestrating malicious flows with bgp T McDaniel, JM Smith, M Schuchard International Conference on Security and Privacy in Communication Systems …, 2020 | 4 | 2020 |
| Measuring Irregular Geographic Exposure on the Internet J Holland, J Smith, M Schuchard arXiv preprint arXiv:1904.09375, 2019 | 2 | 2019 |
| Not so predictable mining pools: Attacking solo mining pools by bagging blocks and conning competitors J Holland, RJ Connor, JP Diamond, JM Smith, M Schuchard International Conference on Financial Cryptography and Data Security, 272-287, 2018 | 2 | 2018 |