Biblio

Export 33 results:
Filters: Author is Stefan Savage  [Clear All Filters]
2019
Ho G, Cidon A, Gavish L, Schweighauser M, Paxson V, Savage S, Voelker GM, Wagner D.  2019.  Detecting and Characterizing Lateral Phishing at Scale. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1273--1290.
Li VGuo, Dunn M, Pearce P, McCoy D, Voelker GM, Savage S.  2019.  Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. 28th {USENIX} Security Symposium ({USENIX} Security 19). :851--867.
Crow S, Farinholt B, Johannesmeyer B, Koscher K, Checkoway S, Savage S, Schulman A, Snoeren AC, Levchenko K.  2019.  Triton: A Software-Reconfigurable Federated Avionics Testbed. 12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19).
2016
Li F, Durumeric Z, Czyz J, Karami M, Bailey M, McCoy D, Savage S, Paxson V.  2016.  You've Got Vulnerability: Exploring Effective Vulnerability Notifications. 25th {USENIX} Security Symposium ({USENIX} Security 16). :1033--1050.
2015
Foster I, Prudhomme A, Koscher K, Savage S.  2015.  Fast and Vulnerable: A Story of Telematic Failures. 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15).
2013
Lian W, Rescorla E, Shacham H, Savage S.  2013.  Measuring the Practical Impact of DNSSEC Deployment. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :573--588.
2012
Yuan D, Park S, Huang P, Liu Y, Lee MM, Tang X, Zhou Y, Savage S.  2012.  Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). :293--306.
McCoy D, Pitsillidis A, Grant J, Weaver N, Kreibich C, Krebs B, Voelker G, Savage S, Levchenko K.  2012.  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. 21st {USENIX} Security Symposium ({USENIX} Security 12). :1--16.
2009
Vrable M, Savage S, Voelker GM.  2009.  Cumulus: Filesystem Backup to the Cloud. 7th {USENIX} Conference on File and Storage Technologies ({FAST} 09).
Gibson G, Savage S, Sigelman B, Wolski R.  2009.  Panel: Future Challenges to Cloud Computing. Workshop on Hot Topics in Cloud Computing (HotCloud 09).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2009.  Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 09).
2008
Gupta D, Lee S, Vrable M, Savage S, Snoeren AC, Varghese G, Voelker GM, Vahdat A.  2008.  Difference Engine: Harnessing Memory Redundancy in Virtual Machines. 8th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 08).
Kanich C, Levchenko K, Enright B, Voelker GM, Savage S.  2008.  The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2008.  On the Spam Campaign Trail. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
2007
Anderson DS, Fleizach C, Savage S, Voelker GM.  2007.  Spamscatter: Characterizing Internet Scam Hosting Infrastructure. 16th {USENIX} Security Symposium ({USENIX} Security 07).
2004
Singh S, Estan C, Varghese G, Savage S.  2004.  Automated Worm Fingerprinting. 6th Symposium on Operating Systems Design & Implementation ({OSDI} 04).
Cheng Y-C, Hölzle U, Cardwell N, Savage S, Voelker GM.  2004.  Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. 2004 {USENIX} Annual Technical Conference ({USENIX} {ATC} 04).

Pages