Biblio

Export 29 results:
Filters: Author is Geoffrey M. Voelker  [Clear All Filters]
2019
Ho G, Cidon A, Gavish L, Schweighauser M, Paxson V, Savage S, Voelker GM, Wagner D.  2019.  Detecting and Characterizing Lateral Phishing at Scale. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1273--1290.
Li VGuo, Dunn M, Pearce P, McCoy D, Voelker GM, Savage S.  2019.  Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. 28th {USENIX} Security Symposium ({USENIX} Security 19). :851--867.
2018
Thomas S, Voelker GM, Porter G.  2018.  CacheCloud: Towards Speed-of-light Datacenter Communication. 10th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 18).
2014
Liu H, Lu F, Forencich A, Kapoor R, Tewari M, Voelker GM, Papen G, Snoeren AC, Porter G.  2014.  Circuit Switching Under the Radar with REACToR. 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14). :1--15.
2013
Ma X, Huang P, Jin X, Wang P, Park S, Shen D, Zhou Y, Saul LK, Voelker GM.  2013.  eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). :57--70.
Lu F, Voelker GM, Snoeren AC.  2013.  SloMo: Downclocking WiFi Communication. 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). :255--258.
2011
Motoyama M, Levchenko K, Voelker GM.  2011.  Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. 20th {USENIX} Security Symposium ({USENIX} Security 11).
Liu H, Levchenko K, Felegyhazi M, Kreibich C, Maier G, Voelker GM.  2011.  On the Effects of Registrar-level Intervention. 4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 11).
Kanich C, Chachra N, McCoy D, Grier C, Wang D, Motoyama M, Levchenko K, Savage S, Voelker GM.  2011.  No Plan Survives Contact: Experience with Cybercrime Measurement. 4th Workshop on Cyber Security Experimentation and Test ({CSET} 11).
2009
Vrable M, Savage S, Voelker GM.  2009.  Cumulus: Filesystem Backup to the Cloud. 7th {USENIX} Conference on File and Storage Technologies ({FAST} 09).
Tan K, Zhang J, Fang J, Liu H, Ye Y, Wang S, Zhang Y, Wu H, Wang W, Voelker GM.  2009.  Sora: High Performance Software Radio Using General Purpose Multi-core Processors. 6th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 09).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2009.  Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 09).
2008
Voelker GM.  2008.  Banal: Because Format Checking Is So Trite. Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems ({WOWCS} 08).
Gupta D, Lee S, Vrable M, Savage S, Snoeren AC, Varghese G, Voelker GM, Vahdat A.  2008.  Difference Engine: Harnessing Memory Redundancy in Virtual Machines. 8th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 08).
Kanich C, Levchenko K, Enright B, Voelker GM, Savage S.  2008.  The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2008.  On the Spam Campaign Trail. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
Mai HH, Gao C, Liu X, Wang X, Voelker GM.  2008.  Towards Automatic Inference of Task Hierarchies in Complex Systems. Fourth Workshop on Hot Topics in System Dependability (HotDep 08).
2007
Anderson DS, Fleizach C, Savage S, Voelker GM.  2007.  Spamscatter: Characterizing Internet Scam Hosting Infrastructure. 16th {USENIX} Security Symposium ({USENIX} Security 07).
McNett M, Gupta D, Vahdat A, Voelker GM.  2007.  Usher: An Extensible Framework for Managing Clusters of Virtual Machines. 21st Large Installation System Administration Conference ({LISA} 07).
2006
Gupta D, Yocum K, McNett M, Snoeren AC, Vahdat A, Voelker GM.  2006.  To Infinity and Beyond: Time-Warped Network Emulation . 3rd Symposium on Networked Systems Design & Implementation ({NSDI} 06).
2005
Junqueira F, Bhagwan R, Hevia A, Marzullo K, Voelker GM.  2005.  Surviving Internet Catastrophes. 2005 {USENIX} Annual Technical Conference ({USENIX} {ATC} 05).
2004
Cheng Y-C, Hölzle U, Cardwell N, Savage S, Voelker GM.  2004.  Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. 2004 {USENIX} Annual Technical Conference ({USENIX} {ATC} 04).

Pages