Bill Arbaugh
Associate Professor Emeritus
2164 Iribe Center
(301) 405-2774
Research Group(s):
Education:
Ph.D., University of Pennsylvania (Computer Science)
Biography:
Bill Arbaugh is an associate professor emeritus of computer science in the University of Maryland Institute for Advanced Computer Studies.
Bill Arbaugh's research focuses on developing innovative methods and techniques to address the growing challenge of malware. His work aims to create effective solutions to combat cybersecurity threats and enhance protection against malicious software.
Go here to view Arbaugh‘s academic publications on Google Scholar.
Publications
2009
2009. Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.
2006
2006. Partially overlapped channels not considered harmful. Proceedings of the joint international conference on Measurement and modeling of computer systems. :63-74.
2006. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
2006. A client-driven approach for channel management in wireless LANs. IEEE Infocom. 6
2006. Client-driven channel management for wireless LANs. SIGMOBILE Mob. Comput. Commun. Rev.. 10(4):8-10.
2006. Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
2006. Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
2005
2005. Weighted coloring based channel assignment for WLANs. ACM SIGMOBILE Mobile Computing and Communications Review. 9(3):19-31.
2005. Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
2005. Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. :29-29.
2005. ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
2005. Efficient strategies for channel management in wireless lans. UMD, CS Tech. Rep. CS-TR. 4729
2004
2004. High-performance MAC for high-capacity wireless LANs. 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. :167-172.
2004. Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
2004. Achieving packet-level quality of service through scheduling in multirate WLANs. Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. 4:2730-2734Vol.4-2730-2734Vol.4.
2004. Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.
2004. Proactive key distribution using neighbor graphs. IEEE Wireless Communications. 11(1):26-36.
2003
2003. WLAN problems and solutions. Communications of the ACM. 46(5):31-34.
2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
2003. Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. :342-346.
2003. An Analysis of the Layer 2 Handoff costs in Wireless Local Area Networks. ACM Computer Communications Review. 33(2)
2003. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
2003. A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
2002
2002. Your 802.11 network has no clothes. IEEE Communications Magazine. 9:44-51.
2002. Using independent auditors as intrusion detection systems. Information and Communications Security. :291-302.
2001
2001. A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
2001. The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.
2001. Personal secure booting. Information Security and Privacy. :130-144.
2000
2000. Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.
2000. Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
1998
1998. A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
1998. Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
1998. Security for virtual private intranets. Computer. 31(9):48-55.
1998. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
1998. DHCP++: Applying an efficient implementation method for fail-stop cryptographic protocols. Proceedings of Global Internet (GlobeCom)’98. :59-65.
1998. The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
1997
1997. A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.