Biblio

Export 34 results:
Filters: Author is Stefan Savage  [Clear All Filters]
2021
Ho G, Dhiman M, Akhawe D, Paxson V, Savage S, Voelker GM, Wagner D.  2021.  Hopper: Modeling and Detecting Lateral Movement. 30th USENIX Security Symposium (USENIX Security 21). :3093--3110.
Johnson E, Bland M, Zhu YF, Mason J, Checkoway S, Savage S, Levchenko K.  2021.  Jetset: Targeted Firmware Rehosting for Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :321--338.
2015
Foster I, Prudhomme A, Koscher K, Savage S.  2015.  Fast and Vulnerable: A Story of Telematic Failures. 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15).
2013
Lian W, Rescorla E, Shacham H, Savage S.  2013.  Measuring the Practical Impact of DNSSEC Deployment. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :573--588.
2012
Yuan D, Park S, Huang P, Liu Y, Lee MM, Tang X, Zhou Y, Savage S.  2012.  Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). :293--306.
McCoy D, Pitsillidis A, Grant J, Weaver N, Kreibich C, Krebs B, Voelker G, Savage S, Levchenko K.  2012.  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. 21st {USENIX} Security Symposium ({USENIX} Security 12). :1--16.
2009
Vrable M, Savage S, Voelker GM.  2009.  Cumulus: Filesystem Backup to the Cloud. 7th {USENIX} Conference on File and Storage Technologies ({FAST} 09).
Gibson G, Savage S, Sigelman B, Wolski R.  2009.  Panel: Future Challenges to Cloud Computing. Workshop on Hot Topics in Cloud Computing (HotCloud 09).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2009.  Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 09).
2008
Gupta D, Lee S, Vrable M, Savage S, Snoeren AC, Varghese G, Voelker GM, Vahdat A.  2008.  Difference Engine: Harnessing Memory Redundancy in Virtual Machines. 8th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 08).
Kanich C, Levchenko K, Enright B, Voelker GM, Savage S.  2008.  The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2008.  On the Spam Campaign Trail. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
2007
Anderson DS, Fleizach C, Savage S, Voelker GM.  2007.  Spamscatter: Characterizing Internet Scam Hosting Infrastructure. 16th {USENIX} Security Symposium ({USENIX} Security 07).
2004
Singh S, Estan C, Varghese G, Savage S.  2004.  Automated Worm Fingerprinting. 6th Symposium on Operating Systems Design & Implementation ({OSDI} 04).

Pages