Biblio

Export 31 results:
Filters: Author is Geoffrey M. Voelker  [Clear All Filters]
2021
Ho G, Dhiman M, Akhawe D, Paxson V, Savage S, Voelker GM, Wagner D.  2021.  Hopper: Modeling and Detecting Lateral Movement. 30th USENIX Security Symposium (USENIX Security 21). :3093--3110.
2019
Ho G, Cidon A, Gavish L, Schweighauser M, Paxson V, Savage S, Voelker GM, Wagner D.  2019.  Detecting and Characterizing Lateral Phishing at Scale. 28th USENIX Security Symposium (USENIX Security 19). :1273--1290.
Li VGuo, Dunn M, Pearce P, McCoy D, Voelker GM, Savage S.  2019.  Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. 28th USENIX Security Symposium (USENIX Security 19). :851--867.
2018
Thomas S, Voelker GM, Porter G.  2018.  CacheCloud: Towards Speed-of-light Datacenter Communication. 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18).
2014
Liu H, Lu F, Forencich A, Kapoor R, Tewari M, Voelker GM, Papen G, Snoeren AC, Porter G.  2014.  Circuit Switching Under the Radar with REACToR. 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). :1--15.
2013
Ma X, Huang P, Jin X, Wang P, Park S, Shen D, Zhou Y, Saul LK, Voelker GM.  2013.  eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :57--70.
Lu F, Voelker GM, Snoeren AC.  2013.  SloMo: Downclocking WiFi Communication. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :255--258.
2009
Vrable M, Savage S, Voelker GM.  2009.  Cumulus: Filesystem Backup to the Cloud. 7th USENIX Conference on File and Storage Technologies (FAST 09).
Tan K, Zhang J, Fang J, Liu H, Ye Y, Wang S, Zhang Y, Wu H, Wang W, Voelker GM.  2009.  Sora: High Performance Software Radio Using General Purpose Multi-core Processors. 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI 09).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2009.  Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 09).
2008
Voelker GM.  2008.  Banal: Because Format Checking Is So Trite. Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS 08).
Gupta D, Lee S, Vrable M, Savage S, Snoeren AC, Varghese G, Voelker GM, Vahdat A.  2008.  Difference Engine: Harnessing Memory Redundancy in Virtual Machines. 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI 08).
Kanich C, Levchenko K, Enright B, Voelker GM, Savage S.  2008.  The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2008.  On the Spam Campaign Trail. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
Mai HH, Gao C, Liu X, Wang X, Voelker GM.  2008.  Towards Automatic Inference of Task Hierarchies in Complex Systems. Fourth Workshop on Hot Topics in System Dependability (HotDep 08).
2007
Anderson DS, Fleizach C, Savage S, Voelker GM.  2007.  Spamscatter: Characterizing Internet Scam Hosting Infrastructure. 16th USENIX Security Symposium (USENIX Security 07).
McNett M, Gupta D, Vahdat A, Voelker GM.  2007.  Usher: An Extensible Framework for Managing Clusters of Virtual Machines. 21st Large Installation System Administration Conference (LISA 07).
2006
Gupta D, Yocum K, McNett M, Snoeren AC, Vahdat A, Voelker GM.  2006.  To Infinity and Beyond: Time-Warped Network Emulation . 3rd Symposium on Networked Systems Design & Implementation (NSDI 06).

Pages