Publications
Enhancing Byte-Level Network Intrusion Detection Signatures with Context.
Proceedings of ACM CCS.
(2003).
(2004). Exploiting Independent State For Network Intrusion Detection.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
(2005).
(2010). An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention.
Concurrency and Computation: Practice and Experience. 21(10), 1255-1279.
(2009).
(2010).
(2012).
(2014). Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data.
ICSI Technical Report.
(2015). Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data.
Proceedings of 2016 Annual Computer Security Applications Conference.
(2016).