I also publish content in The Startup on Medium at https://dave-dittrich.medium.com/ and on the Honeynet Project blog.

Articles/Editorials/Blog posts






  • The Ethics of Social Honeypots, by David Dittrich, December 4, 2012. [Available at SSRN: http://ssrn.com/abstract=2184997 This paper was listed on SSRN’s Top Ten download list six times between 12/10/2012 and 1/6/2013 for the following eJournals: Information Systems: Behavioral & Social Methods eJournal; Technology & Ethics (Sub-Topic), eBusiness & eCommerce eJournal; Applied Ethics (Topic) and eBusiness & eCommerce eJournal; Ethics eJournal; and ISN Subject Matter eJournals and Information Systems & eBusiness Network.]

  • So You Want to Take Over a Botnet…, by David Dittrich, LEET ‘12: Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 2012. (Slides and paper)

  • The Menlo Report, by Michael Bailey, David Dittrich, Erin Kenneally, and Douglas Maughan, IEEE Security & Privacy, 10(2):71–75, March/April 2012. (Local copy of IEEE article)


  • The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research, co-lead editors David Dittrich and Erin Kenneally, December 28, 2011

  • Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research, by Katherine Carpenter and David Dittrich, in 1st International Digital Ethics Symposium, Loyola University Chicago Center for Digital Ethics and Policy, October 28, 2011. [Local copy of Loyola 2011 paper and Loyola 2011 slides]

  • Creating Realistic Corpora for Security and Forensic Education, by Kam Woods, Christopher Lee, Simson Garfinkel, David Dittrich, Adam Russell, and Kris Kearton, in Proceedings from the Sixth Annual ADFSL Conference on Digital Forensics, Security, and the Law, 2011.

  • Computer Science Security Research and Human Subjects: Emerging Considerations for Research Ethics Boards, by Elizabeth Buchanan, John Aycock, Scott Dexter, David Dittrich, and Erin Hvidzak, Journal of Empirical Research on Human Research Ethics, 6(2):71-83, June 2011.

  • Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research, by John Aycock, Elizabeth Buchanan, Scott Dexter, and David Dittrich, in Workshop on Ethics in Computer Security 2011, St. Lucia, April, 2011 [Local copy of WECSR 2011 paper and slides]


  • Building An Active Computer Security Ethics Community, by David Dittrich, Michael Bailey, and Sven Dietrich, IEEE Security and Privacy, 9(4):32-40, July/August 2011 (pre-publication December 16, 2010)

  • A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets, David Dittrich, Felix Leder and Tillmann Werner, in Workshop on Ethics in Computer Security (WECSR) 2010, Tenerife, Spain, January, 2010 [Local copy of WECSR 2010 paper]





  • The Manuka Project, by Barbara Endicott-Popovsky, David Dittrich, Amelia Phillips, Deb Frincke, Jose Chavez, W. Jenks Gibbons, Don Nguyen, Christian Seifert, Amy Shephard, Chris Abate, Shawn Loveland, Proceedings of the 2004 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2004 [Local copy of IEEE IA 2004 paper]

  • Customizing ISOs and the Honeynet Project’s Honeywall, by David Dittrich, IEEE IA Workshop poster session paper, March 22, 2004


Books/Book Chapters