Bill Arbaugh

Associate Professor Emeritus
2164 Iribe Center
(301) 405-2774
Research Group(s): 
Education: 
Ph.D., University of Pennsylvania (Computer Science)
Biography: 

Bill Arbaugh is an associate professor emeritus of computer science in the University of Maryland Institute for Advanced Computer Studies.

Bill Arbaugh's research focuses on developing innovative methods and techniques to address the growing challenge of malware. His work aims to create effective solutions to combat cybersecurity threats and enhance protection against malicious software.

Go here to view Arbaugh‘s academic publications on Google Scholar.

Publications

2009


Shin M, Arbaugh WA.  2009.  Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.

2006


Mishra A, Brik V, Banerjee S, Srinivasan A, Arbaugh WA.  2006.  Client-driven channel management for wireless LANs. SIGMOBILE Mob. Comput. Commun. Rev.. 10(4):8-10.

Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security.
:3-6.

Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.

Mishra A, Shrivastava V, Banerjee S, Arbaugh WA.  2006.  Partially overlapped channels not considered harmful. Proceedings of the joint international conference on Measurement and modeling of computer systems.
:63-74.

Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium.
:20-20.

2005


Mishra A, Rozner E, Banerjee S, Arbaugh WA.  2005.  Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement.
:29-29.

Yuan Y, Yang H, Wong SHY, Lu S, Arbaugh WA.  2005.  ROMER: resilient opportunistic mesh routing for wireless mesh networks. Proc. of IEEE WiMesh. 166

Mishra A, Brik V, Banerjee S, Srinivasan A, Arbaugh WA.  2005.  Efficient strategies for channel management in wireless lans. UMD, CS Tech. Rep. CS-TR. 4729

Mishra A, Banerjee S, Arbaugh WA.  2005.  Weighted coloring based channel assignment for WLANs. ACM SIGMOBILE Mobile Computing and Communications Review. 9(3):19-31.

Yu Z, Seng CY, Jiang T, Wu X, Arbaugh WA.  2005.  Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience.
:36-47.

Yang H, Ye F, Yuan Y, Lu S, Arbaugh WA.  2005.  Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing.
:34-45.

2004


Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13.
:13-13.

Yuan Y, Gu D, Arbaugh WA, Zhang J.  2004.  Achieving packet-level quality of service through scheduling in multirate WLANs. Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. 4:2730-2734Vol.4-2730-2734Vol.4.

Mishra A, Petroni Jr NL, Arbaugh WA, Fraser T.  2004.  Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.

Mishra A, Shin M H, Petroni NL, Clancy TC, Arbaugh WA.  2004.  Proactive key distribution using neighbor graphs. IEEE Wireless Communications. 11(1):26-36.

Yuan Y, Gu D, Arbaugh WA, Zhang J.  2004.  High-performance MAC for high-capacity wireless LANs. 13th International Conference on Computer Communications and Networks, 2004. ICCCN 2004. Proceedings.
:167-172.

2003


Khalili A, Katz J, Arbaugh WA.  2003.  Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on.
:342-346.

Mishra A, Shin MH, Arbaugh WA.  2003.  An Analysis of the Layer 2 Handoff costs in Wireless Local Area Networks. ACM Computer Communications Review. 33(2)

Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.

Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.

Housley R, Arbaugh WA.  2003.  WLAN problems and solutions. Communications of the ACM. 46(5):31-34.

2002


Mishra A, Shin M, Arbaugh WA.  2002.  Your 802.11 network has no clothes. IEEE Communications Magazine. 9:44-51.

Molina J, Arbaugh WA.  2002.  Using independent auditors as intrusion detection systems. Information and Communications Security.
:291-302.

2001


Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM.  2001.  The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.

Itoi N, Arbaugh WA, Pollack S, Reeves D.  2001.  Personal secure booting. Information Security and Privacy.
:130-144.

Browne HK, Arbaugh WA, McHugh J, Fithen WL.  2001.  A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings.
:214-229.

2000


Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.

Arbaugh WA, Fithen WL, McHugh J.  2000.  Windows of Vulnerability: A Case Study Analysis. Computer. 33(12):52-59.

1998


Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98).
:155-167.

Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.

Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.

Arbaugh WA, Keromytis AD, Smith JM.  1998.  DHCP++: Applying an efficient implementation method for fail-stop cryptographic protocols. Proceedings of Global Internet (GlobeCom)’98.
:59-65.

Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.

Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.

1997


Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings.
:65-71.