USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 32 results:
Filters: Author is Geoffrey M. Voelker [Clear All Filters]
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender. Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). :77--95.
.
2023. Hopper: Modeling and Detecting Lateral Movement. 30th USENIX Security Symposium (USENIX Security 21). :3093--3110.
.
2021. Detecting and Characterizing Lateral Phishing at Scale. 28th USENIX Security Symposium (USENIX Security 19). :1273--1290.
.
2019. Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. 28th USENIX Security Symposium (USENIX Security 19). :851--867.
.
2019. CacheCloud: Towards Speed-of-light Datacenter Communication. 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18).
.
2018. Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
.
2017. Circuit Switching Under the Radar with REACToR. 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). :1--15.
.
2014. eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :57--70.
.
2013. SloMo: Downclocking WiFi Communication. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :255--258.
.
2013. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. On the Effects of Registrar-level Intervention. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
.
2011. No Plan Survives Contact: Experience with Cybercrime Measurement. 4th Workshop on Cyber Security Experimentation and Test (CSET 11).
.
2011. Show Me the Money: Characterizing Spam-advertised Revenue. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Measuring Online Service Availability Using Twitter. 3rd Workshop on Online Social Networks (WOSN 2010).
.
2010. Re: CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic Context. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. Cumulus: Filesystem Backup to the Cloud. 7th USENIX Conference on File and Storage Technologies (FAST 09).
.
2009. Sora: High Performance Software Radio Using General Purpose Multi-core Processors. 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI 09).
.
2009. Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 09).
.
2009. Banal: Because Format Checking Is So Trite. Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS 08).
.
2008. Difference Engine: Harnessing Memory Redundancy in Virtual Machines. 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI 08).
.
2008. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
.
2008. On the Spam Campaign Trail. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
.
2008. Towards Automatic Inference of Task Hierarchies in Complex Systems. Fourth Workshop on Hot Topics in System Dependability (HotDep 08).
.
2008. Spamscatter: Characterizing Internet Scam Hosting Infrastructure. 16th USENIX Security Symposium (USENIX Security 07).
.
2007. Usher: An Extensible Framework for Managing Clusters of Virtual Machines. 21st Large Installation System Administration Conference (LISA 07).
.
2007.