David Adrian
University of Michigan
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by David Adrian.
internet measurement conference | 2014
Zakir Durumeric; Frank Li; James Kasten; Johanna Amann; Jethro G. Beekman; Mathias Payer; Nicolas Weaver; David Adrian; Vern Paxson; Michael Bailey; J. Alex Halderman
The Heartbleed vulnerability took the Internet by surprise in April 2014. The vulnerability, one of the most consequential since the advent of the commercial Internet, allowed attackers to remotely read protected memory from an estimated 24--55% of popular HTTPS sites. In this work, we perform a comprehensive, measurement-based analysis of the vulnerabilitys impact, including (1) tracking the vulnerable population, (2) monitoring patching behavior over time, (3) assessing the impact on the HTTPS certificate ecosystem, and (4) exposing real attacks that attempted to exploit the bug. Furthermore, we conduct a large-scale vulnerability notification experiment involving 150,000 hosts and observe a nearly 50% increase in patching by notified hosts. Drawing upon these analyses, we discuss what went well and what went poorly, in an effort to understand how the technical community can respond more effectively to such events in the future.
mobile ad hoc networking and computing | 2015
Yue Liu; David R. Bild; David Adrian; Gulshan Singh; Robert P. Dick; Dan S. Wallach; Z. Morley Mao
Delay Tolerant Networks (DTNs) composed of commodity mobile devices have the potential to support communication applications resistant to blocking and censorship, as well as certain types of surveillance. We analyze the performance and energy consumption of such a network, and consider the impact of random and targeted denial-of-service and censorship attacks. To gather wireless connectivity traces for a DTN composed of human-carried commodity smartphones, we implemented and deployed a prototype DTN-based micro-blogging application, called 1am, in a college town. We analyzed the system during a time period with 111 users. Although the study provided detailed enough connectivity traces to enable analysis, message posting was too infrequent to draw strong conclusions based on user-initiated messages, alone. We therefore simulated more frequent message initiations and used measured connectivity traces to analyze message propagation. Using a flooding protocol, we found that with an adoption rate of 0.2% of a college towns student and faculty population, the median one-week delivery rate is 85% and the median delivery delay is 13 hours. We also found that the network delivery rate and delay are robust to denial-of service and censorship attacks eliminating more than half of the participants. Using a measurement-based energy model, we also found that the DTN system would use less than 10.0% of a typical smartphones battery energy per day in a network of 2,500 users.
conference on privacy security and trust | 2016
Ariana Mirian; Zane Ma; David Adrian; Matthew Tischer; Thasphon Chuenchujit; Tim Yardley; Robin Berthier; Joshua Mason; Zakir Durumeric; J. Alex Halderman; Michael Bailey
Industrial control systems have become ubiquitous, enabling the remote, electronic control of physical equipment and sensors. Originally designed to operate on closed networks, the protocols used by these devices have no built-in security. However, despite this, an alarming number of systems are connected to the public Internet and an attacker who finds a device often can cause catastrophic damage to physical infrastructure. We consider two aspects of ICS security in this work: (1) what devices have been inadvertently exposed on the public Internet, and (2) who is searching for vulnerable systems. First, we implement five common SCADA protocols in ZMap and conduct a survey of the public IPv4 address space finding more than 60K publicly accessible systems. Second, we use a large network telescope and high-interaction honeypots to find and profile actors searching for devices. We hope that our findings can both motivate and inform future work on securing industrial control systems.
computer and communications security | 2015
David Adrian; Karthikeyan Bhargavan; Zakir Durumeric; Pierrick Gaudry; Matthew Green; J. Alex Halderman; Nadia Heninger; Drew Springall; Emmanuel Thomé; Luke Valenta; Benjamin VanderSloot; Eric Wustrow; Santiago Zanella-Béguelin; Paul Zimmermann
computer and communications security | 2015
Zakir Durumeric; David Adrian; Ariana Mirian; Michael Bailey; J. Alex Halderman
internet measurement conference | 2015
Zakir Durumeric; David Adrian; Ariana Mirian; James Kasten; Elie Bursztein; Nicolas Lidzborski; Kurt Thomas; Vijay Eranti; Michael Bailey; J. Alex Halderman
usenix security symposium | 2016
Christoph Paar; David Adrian; Emilia Käsper; J. Alex Halderman; Jens Steube; Juraj Somorovsky; Luke Valenta; Maik Dankel; Nadia Heninger; Nimrod Aviram; Sebastian Schinzel; Shaanan Cohney; Susanne Engels; Viktor Dukhovni; Yuval Shavitt
WOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies | 2014
David Adrian; Zakir Durumeric; Gulshan Singh; J. Alex Halderman
ieee symposium on security and privacy | 2018
Deepak Kumar; Zhengping Wang; Matthew Hyder; Joseph Dickinson; Gabrielle Beck; David Adrian; Joshua Mason; Zakir Durumeric; J. Alex Halderman; Michael Bailey
network and distributed system security symposium | 2017
Luke Valenta; David Adrian; Antonio Sanso; Shaanan Cohney; Joshua Fried; Marcella Hastings; J. Alex Halderman; Nadia Heninger