Bill Arbaugh served as an associate professor in the Department of Computer Science for 12 years. He came to the the University of Maryland in 2000 after serving 16 years with the U.S. Department of Defense.
During that time, he served in several leadership positions in different areas, ranging from tactical communications to advanced research. In 2004, Arbaugh founded Komoku Inc. Komoku furthered research, Semantic Integrity, developed by him and his students into a product to detect sophisticated malware. Microsoft purchased Komoku in 2008. Komoku technology currently runs more than 500 million hosts.
Arabugh received his doctorate in computer science from the University of Pennsylvania.
2009. Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.
2006. Client-driven channel management for wireless LANs. SIGMOBILE Mob. Comput. Commun. Rev.. 10(4):8-10.
2006. Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
2006. Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
2006. Partially overlapped channels not considered harmful. Proceedings of the joint international conference on Measurement and modeling of computer systems. :63-74.
2006. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
2006. A client-driven approach for channel management in wireless LANs. IEEE Infocom. 6
2005. Efficient strategies for channel management in wireless lans. UMD, CS Tech. Rep. CS-TR. 4729
2005. Weighted coloring based channel assignment for WLANs. ACM SIGMOBILE Mobile Computing and Communications Review. 9(3):19-31.
2005. Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. :34-45.
2005. Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. :29-29.
2005. ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166
2004. Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.
2004. Proactive key distribution using neighbor graphs. IEEE Wireless Communications. 11(1):26-36.
2004. High-performance MAC for high-capacity wireless LANs. 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. :167-172.
2004. Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
2004. Achieving packet-level quality of service through scheduling in multirate WLANs. Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. 4:2730-2734Vol.4-2730-2734Vol.4.
2003. An Analysis of the Layer 2 Handoff costs in Wireless Local Area Networks. ACM Computer Communications Review. 33(2)
2003. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
2003. A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
2003. WLAN problems and solutions. Communications of the ACM. 46(5):31-34.
2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
2003. Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. :342-346.
2002. Your 802.11 network has no clothes. IEEE Communications Magazine. 9:44-51.
2002. Using independent auditors as intrusion detection systems. Information and Communications Security. :291-302.
2001. Personal secure booting. Information Security and Privacy. :130-144.
2001. A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
2001. The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.
2000. Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.
2000. Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
1998. The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
1998. A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
1998. Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
1998. Security for virtual private intranets. Computer. 31(9):48-55.
1998. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
1998. DHCP++: Applying an efficient implementation method for fail-stop cryptographic protocols. Proceedings of Global Internet (GlobeCom)’98. :59-65.
1997. A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.