For an the current list of publications, please visit here .

2011

  • Contrail: Enabling Decentralized Social Networks on Smartphones by Patrick Stuedi, Iqbal Mohomed, Mahesh Balakrishnan, Ted Wobber, Doug Terry and Z. Morley Mao, Proceedings of Middleware 2011.(PDF)

  • Identifying Diverse Usage Behaviors of Smartphone Apps by Qiang Xu, Jeffrey Erman, Alexandre Gerber, Z. Morley Mao, Jeffrey Pang, and Shobha Venkataraman, Proceedings of IMC 2011.(PDF)

  • Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks by Zhiyun Qian, Z. Morley Mao, Ammar Rayes and David Jaffe, Proceedings of SecureComm 2011.(PDF)

  • An Untold Story of Middleboxes in Cellular Networks by Zhaoguang Wang, Zhiyun Qian, Qiang Xu, Zhuoqing Morley Mao, and Ming Zhang, Proceedings of SIGCOMM 2011.(PDF)

  • AccuLoc: Practical Localization of Performance Measurements in 3G Networks by Qiang Xu, Alex Gerber, Z. Morley Mao, and Jeff Pang, Proceedings of Mobisys 2011.(PDF)

  • Profiling Resource Usage for Mobile Applications: a Cross-layer Approach by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley Mao, Subhabrata Sen, and Oliver Spatscheck Proceedings of Mobisys 2011.(PDF)

  • KnowOps: Towards an Embedded Knowledge Base for Network Management and Operations by Xu Chen, Yun Mao, Z. Morley Mao, and Jacobus Van der Merwe, Proceedings of The first Hot-ICE workshop 2011.(PDF)

  • Internet Censorship in China: Where Does the Filtering Occur? by Xueyang Xu, Z. Morley Mao, and J. Alex Halderman, Proceedings of PAM 2011.(PDF)

  • Can Deterministic Replay be an Enabling Tool for Mobile Computing? by Jason Flinn and Z. Morley Mao, Proceedings of HotMobile 2011.(PDF)

  • Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement by Qiang Xu, Junxian Huang, Zhaoguang Wang, Feng Qian, Alexandre Gerber, and Z. Morley Mao, Proceedings of SIGMETRICS 2011.(PDF)

  • 2010

  • Characterizing Radio Resource Allocation for 3G Networks by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley Mao, Subhabrata Sen, and Oliver Spatscheck, Proceedings of IMC 2010.

  • TOP: Tail Optimization Protocol for Cellular Radio Resource Allocation by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley Mao, Subhabrata Sen, and Oliver Spatscheck, Proceedings of ICNP 2010.

  • iSPY: Detecting IP Prefix Hijacking on My Own by Zheng Zhang, Ying Zhang, Y. Charlie Hu, Z. Morley Mao, and Randy Bush, To appear in ACM/IEEE Transactions on Networking (ToN), 2010.

  • Accurate Online Power Estimation and Automatic Battery Behavior Based Power Model Generation for Smartphones by Lide Zhang, Birjodh Tiwana, Zhiyun Qian, Zhaoguang Wang, Robert Dick, Z. Morley Mao and Lei Yang, Proceedings of CODES+ISSS 2010.

  • Performance and Power Modeling in a Multi-Programmed Multi-Core Environment by Xi Chen, Chi Xu, Robert Dick, and Z. Morley Mao, Proceedings of Design Automation Conference (DAC) 2010.

  • Anatomizing Application Performance Differences on Smartphones by Junxian Huang, Qiang Xu, Birjodh Tiwana, Z. Morley Mao, Ming Zhang, Paramvir Bahl, Proceedings of Mobisys 2010.

  • A Case for Unsupervised-Learning-based Spam Filtering by Feng Qian, Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao, and Yinglian Xie, Proceedings of SIGMETRICS 2010 (Extended Abstract).

  • Cache Contention and Application Performance Prediction for Multi-Core Systems by Chi Xu, Xi Chen, Robert P. Dick, and Z. Morley Mao, Proceedings of ISPASS 2010.

  • Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique by Zhiyun Qian, Z. Morley Mao, Yinglian Xie, and Fang Yu, Proceedings of IEEE Security and Privacy (Oakland) 2010.

  • On Network-level Clusters for Spam Detection by Zhiyun Qian, Z. Morley Mao, Yinglian Xie, and Fang Yu, Proceedings of 17th Annual Network & Distributed System Security Symposium (NDSS) 2010.

  • On the Safety of Enterprise Policy Deployment by Yudong Gao, Xu Chen, Ni Pan, and Z. Morley Mao, Proceedings of 17th Annual Network & Distributed System Security Symposium (NDSS) 2010.
  • 2009

  • PACMAN: a Platform for Automated and Controlled network operations and configuration MANagement by Xu Chen, Z. Morley Mao, and Jacobus Van der Merwe, Proceedings of CoNext 2009.

  • TCP Revisited: A Fresh Look at TCP in the Wild by Feng Qian, Alex Gerber, Z. Morley Mao, Subhabrata Sen, Oliver Spatscheck, and Walter Willinger, Proceedings of IMC 2009.

  • Detecting Traffic Differentiation in Backbone ISPs with NetPolice by Ying Zhang, Z. Morley Mao, and Ming Zhang, Proceedings of IMC 2009.

  • Ensemble: Community-based Anomaly Detection for Popular Applications by Feng Qian, Zhiyun Qian, Z. Morley Mao, and Atul Prakash, Proceedings of SecureComm 2009.

  • DECOR: DEClarative network management and OpeRation by Xu Chen, Yun Mao, Z. Morley Mao, and Jacobus Van der Merwe, Proceedings of PRESTO Workshop 2009. (fast-tracked to CCR)

  • ShadowNet: A Platform for Rapid and Safe Network Evolution by Xu Chen, Z. Morley Mao, and Kobus van der Merwe, Proceedings of Usenix Technical Conference 2009.

  • Botnet Spam Campaigns can be Long Lasting: Evidence, Implications, and Analysis by Abhinav Pathak, Feng Qian, Y. Charlie Hu, Z. Morley Mao, and Supranamaya Ranjan, Proceedings of SIGMETRICS 2009.

  • HC-BGP: A Light-weight and Flexible Scheme for Securing Prefix Ownership by Ying Zhang, Zheng Zhang, Z. Morley Mao and Y. Charlie Hu, Proceedings of DSN-DCCS 2009.
  • 2008

    Routing analysis, network security and management:

  • WebBee: A Platform for Secure Mobile Coordination and Communication in Crisis Scenarios by Sugih Jamin, Z. Morley Mao, T. V. Lakshman, Sarit Mukherjee, Jignesh Patel, and Limin Wang et al. , STSC CrossTalk Journal of Defense Software Engineering, Oct 2008.

  • Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs by Ying Zhang, Z. Morley Mao, and Ming Zhang, Proceedings of HotNets 2008.

  • Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions by Xu Chen, Ming Zhang, Z. Morley Mao, and Victor Bahl, Proceedings of OSDI 2008.

  • iSPY: Detecting IP Prefix Hijacking on My Own by Zheng Zhang, Ying Zhang, Y Charlie Hu, Z Morley Mao, and Randy Bush, Proceedings of ACM SIGCOMM 2008.

  • Peeking into Spammer Behavior from a Unique Vantage Point by Abhinav Pathak, Y. Charlie Hu, and Z. Morley Mao, Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) 2008.

  • Deterring Malware by Imitating Emulation and Debugging Environment by Xu Chen, Jon Andersen, Z. Morley Mao, Michael Bailey, Jose Nazario, and Farnam Jahanian, Proceedings of DSN-DCCS 2008.

  • A Measurement Study of Internet Delay Asymmetry by Abhinav Pathak, Himabindu Pucha, Ying Zhang, Y. Charlie Hu, and Z. Morley Mao, Proceedings of Passive and Active Measurement Conference (PAM) 2008.

  • Effective Diagnosis of Routing Disruptions from End Systems by Ying Zhang, Z. Morley Mao and Ming Zhang, Proceedings of NSDI 2008.

  • Wide-Area IP Network Mobility by Xin Hu, Li Li, Z. Morley Mao, and Yang Richard Yang, Proceedings of IEEE INFOCOM 2008.

  • Internet traffic and multiresolution analysis by Ying Zhang, Zihui Ge, Suhas Diggavi, Z. Morley Mao, Matthew Roughan, Vinay Vaishampayan, Walter Willinger, and Yin Zhang, Markov Processes and Related Fields: A Festschrift in Honor of Thomas G. Kurtz/, S. N. Ethier, J. Feng and R. H. Stockbridge (eds.), IMS Lecture Notes--Monograph Series.
  • 2007

    • Internet traffic and multiresolution analysis by Ying Zhang, Zihui Ge, Suhas Diggavi, Z. Morley Mao, Matthew Roughan, Vinay Vaishampayan, Walter Willinger, and Yin Zhang, Markov Processes and Related Fields: A Festschrift in Honor of Thomas G. Kurtz/, S. N. Ethier, J. Feng and R. H. Stockbridge (eds.), IMS Lecture Notes--Monograph Series.(PDF)
    • Practical Defenses Against BGP Prefix Hijacking by Zheng Zhang, Ying Zhang, Y. Charlie Hu and Z. Morley Mao, Proceedings of CoNext 2007.(PDF)
    • Internet Routing Resilience to Failures: Analysis and Implications by Jian Wu and Ying Zhang, Z. Morley Mao, and Kang Shin, Proceedings of CoNext 2007.(PDF)
    • On the Impact of Route Monitor Selection by Ying Zhang, Zheng Zhang, Z. Morley Mao, Y. Charlie Hu, and Bruce Maggs, Proceedings of ACM Internet Measurement Conference (IMC) 2007.(PDF)
    • Automated Classification and Analysis of Internet Malware by Michael Bailey, Jon Oberheide, Jon Andersen, Z. Morley Mao, Farnam Jahanian, and Jose Nazario, Proceedings of RAID 2007.(PDF)
    • Towards Automated Network Management: Network Operations using Dynamic Views by Xu Chen, Z. Morley Mao, and Kobus van der Merwe, Procedings of SIGCOMM INM workshop 2007.(PDF)
    • MIDAS: An Impact Scale for DDoS attacks by Ranga Vasudevan, Z. Morley Mao, Oliver Spatscheck, Kobus Van der Merwe, Proceedings of LANMAN 2007 (15th Workshop on Local and Metropolitan Area Networks).(PDF)
    • Characterizing Dark DNS Behavior by Jon Oberheide, Manish Karir and Z. Morley Mao, Proceedings of DIMVA 2007.(PDF)
    • A Firewall for Routers: Protecting Against Routing Misbehavior by Ying Zhang, Z. Morley Mao, Jia Wang, Proceedings of DSN-DCCS 2007.(PDF)
    • Understanding Network Delay Changes Caused by Routing Events by Himabindu Pucha, Ying Zhang, Z. Morley Mao, Y. Charlie Hu, Proceedings of ACM SIGMETRICS 2007.(PDF)
    • Accurate Real-time Identification of IP Prefix Hijacking by Xin Hu and Z. Morley Mao, Proceedings of IEEE Security and Privacy (Oakland) 2007.(PDF)
    • A Framework for Measuring and Predicting Impact of Routing Changes by Ying Zhang, Z. Morley Mao, and Jia Wang, Proceedings of IEEE INFOCOM 2007. (PDF)
    • Low-Rate TCP-Targeted DoS Attacks Disrupts Internet Routing by Ying Zhang, Z. Morley Mao, and Jia Wang, Proceedings of 14th Annual Network & Distributed System Security Symposium (NDSS) 2007.(PDF)

     

    2006

    • Tussle in Routing: Who Determines Internet Paths? by Z. Morley Mao. Invited paper, Workshop on Internet Routing Evolution and Design (WIRED), 2006 (PDF)
    • On the Impact of Research Network Based Testbeds on Wide-area Experiments by Himabindu Pucha, Y. Charlie Hu, and Z. Morley Mao, Proceedings of ACM Internet Measurement Conference (IMC) 2006. (paper [PDF])
    • Internet-scale Malware Mitigation: Combining Intelligence of the Control and Data Plane by Ying Zhang, Evan Cooke, and Z. Morley Mao, Proceedings of WORM 2006. (paper [PDF])
    • Differentiated BGP Update Processing for Improved Routing Convergence by Wei Sun, Z. Morley Mao, and Kang Shin, Proceedings of IEEE ICNP 2006. (paper [PDF])
    • Analyzing Large DDoS Attacks using Multiple Data Sources, by Z. Morley Mao, Vyas Sekar, Oliver Spatscheck, Jacobus van der Merwe, Rangarajan Vasudevan, Proceedings of ACM SIGCOMM Workshop on Large-Scale Attack Defense (LSAD) 2006. (paper [PDF])
    • A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance, by Feng Wang, Z. Morley Mao, Jia Wang, Lixin Gao, and Randy Bush, Proceedings of ACM SIGCOMM 2006. (paper [PDF])
    • Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies, by Ranga Vasudevan, Z. Morley Mao, Oliver Spatscheck, Kobus Van der Merwe, Proceedings of Usenix Technical Conference 2006. (paper [PDF])
    • Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware, by Evan Cooke, Z. Morley Mao, Farnam Jahanian, Proceedings of DSN 2006. (paper [PDF])
    • Is BGP Update Storm a Sign of Trouble: Observing the Internet Control and Data Planes During Internet Worms, by Matthew Roughan, Jun Li, Randy Bush, Zhuoqing Mao and Timothy Griffin, Proceedings of SPECTS 2006. (paper [PDF])
    • Watching Data Streams Toward a Multi-Homed Sink Under Routing Changes Introduced by a BGP Beacon, by Jun Li, Randy Bush, Z. Mao, Tim Griffin, Matt Roughan, Dan Stutzbach, and E. Purpus, Proceedings of Passive and Active Measurement Conference (PAM) 2006. (paper [PDF]

     

     

     

     

     

     

    © 2004-2011 RobustNet Research Group, University of Michigan, Ann Arbor, MI