Bill Arbaugh

Associate Professor Emeritus
4137 A.V. Williams Building
(301) 405-2774
Ph.D., University of Pennsylvania (Computer Science)

Bill Arbaugh served as an associate professor in the Department of Computer Science for 12 years. He came to the the University of Maryland in 2000 after serving 16 years with the U.S. Department of Defense.

During that time, he served in several leadership positions in different areas, ranging from tactical communications to advanced research. In 2004, Arbaugh founded Komoku Inc. Komoku furthered research, Semantic Integrity, developed by him and his students into a product to detect sophisticated malware. Microsoft purchased Komoku in 2008. Komoku technology currently runs more than 500 million hosts.

Arabugh received his doctorate in computer science from the University of Pennsylvania.



Shin M, Arbaugh WA.  2009.  Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.


Mishra A, Shrivastava V, Banerjee S, Arbaugh WA.  2006.  Partially overlapped channels not considered harmful. Proceedings of the joint international conference on Measurement and modeling of computer systems.

Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium.

Mishra A, Brik V, Banerjee S, Srinivasan A, Arbaugh WA.  2006.  Client-driven channel management for wireless LANs. SIGMOBILE Mob. Comput. Commun. Rev.. 10(4):8-10.

Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security.

Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.


Mishra A, Banerjee S, Arbaugh WA.  2005.  Weighted coloring based channel assignment for WLANs. ACM SIGMOBILE Mobile Computing and Communications Review. 9(3):19-31.

Yu Z, Seng CY, Jiang T, Wu X, Arbaugh WA.  2005.  Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience.

Yang H, Ye F, Yuan Y, Lu S, Arbaugh WA.  2005.  Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing.

Mishra A, Rozner E, Banerjee S, Arbaugh WA.  2005.  Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement.

Yuan Y, Yang H, Wong SHY, Lu S, Arbaugh WA.  2005.  ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166

Mishra A, Brik V, Banerjee S, Srinivasan A, Arbaugh WA.  2005.  Efficient strategies for channel management in wireless lans. UMD, CS Tech. Rep. CS-TR. 4729


Mishra A, Shin M H, Petroni NL, Clancy TC, Arbaugh WA.  2004.  Proactive key distribution using neighbor graphs. IEEE Wireless Communications. 11(1):26-36.

Yuan Y, Gu D, Arbaugh WA, Zhang J.  2004.  High-performance MAC for high-capacity wireless LANs. 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings.

Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13.

Yuan Y, Gu D, Arbaugh WA, Zhang J.  2004.  Achieving packet-level quality of service through scheduling in multirate WLANs. Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. 4:2730-2734Vol.4-2730-2734Vol.4.

Mishra A, Petroni Jr NL, Arbaugh WA, Fraser T.  2004.  Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.


Housley R, Arbaugh WA.  2003.  WLAN problems and solutions. Communications of the ACM. 46(5):31-34.

Khalili A, Katz J, Arbaugh WA.  2003.  Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on.

Mishra A, Shin MH, Arbaugh WA.  2003.  An Analysis of the Layer 2 Handoff costs in Wireless Local Area Networks. ACM Computer Communications Review. 33(2)

Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.

Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.


Mishra A, Shin M, Arbaugh WA.  2002.  Your 802.11 network has no clothes. IEEE Communications Magazine. 9:44-51.

Molina J, Arbaugh WA.  2002.  Using independent auditors as intrusion detection systems. Information and Communications Security.


Browne HK, Arbaugh WA, McHugh J, Fithen WL.  2001.  A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings.

Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM.  2001.  The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.

Itoi N, Arbaugh WA, Pollack S, Reeves D.  2001.  Personal secure booting. Information Security and Privacy.


Arbaugh WA, Fithen WL, McHugh J.  2000.  Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.

Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.


Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.

Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.

Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98).

Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.

Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.

Arbaugh WA, Keromytis AD, Smith JM.  1998.  DHCP++: Applying an efficient implementation method for fail-stop cryptographic protocols. Proceedings of Global Internet (GlobeCom)’98.


Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings.