scispace - formally typeset
F

Farnam Jahanian

Researcher at University of Michigan

Publications -  129
Citations -  11788

Farnam Jahanian is an academic researcher from University of Michigan. The author has contributed to research in topics: The Internet & Formal specification. The author has an hindex of 49, co-authored 128 publications receiving 11598 citations. Previous affiliations of Farnam Jahanian include IBM & Technische Universität München.

Papers
More filters
Journal ArticleDOI

Delayed Internet routing convergence

TL;DR: This paper presents a two-year study of Internet routing convergence through the experimental instrumentation of key portions of the Internet infrastructure, including both passive data collection and fault-injection machines at Internet exchange points, and describes several unexpected properties of convergence.
Journal ArticleDOI

Safety analysis of timing properties in real-time systems

TL;DR: The authors formalize the safety analysis of timing properties in real-time systems based on a formal logic, RTL (real-time logic), which is especially suitable for reasoning about the timing behavior of systems.
Proceedings ArticleDOI

Internet inter-domain traffic

TL;DR: The majority of inter-domain traffic by volume now flows directly between large content providers, data center / CDNs and consumer networks, and this analysis shows significant changes in inter-AS traffic patterns and an evolution of provider peering strategies.
Book ChapterDOI

Automated classification and analysis of internet malware

TL;DR: This paper examines the ability of existing host-based anti-virus products to provide semantically meaningful information about the malicious software and tools used by attackers and proposes a new classification technique that describes malware behavior in terms of system state changes rather than in sequences or patterns of system calls.
Proceedings Article

The Zombie roundup: understanding, detecting, and disrupting botnets

TL;DR: This paper outlines the origins and structure of bots and botnets and uses data from the operator community, the Internet Motion Sensor project, and a honeypot experiment to illustrate the botnet problem today and describes a system to detect botnets that utilize advanced command and control systems by correlating secondary detection data from multiple sources.