USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 36 results:
Filters: Author is Stefan Savage [Clear All Filters]
Hopper: Modeling and Detecting Lateral Movement. 30th USENIX Security Symposium (USENIX Security 21). :3093--3110.
.
2021. Jetset: Targeted Firmware Rehosting for Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :321--338.
.
2021. Detecting and Characterizing Lateral Phishing at Scale. 28th USENIX Security Symposium (USENIX Security 19). :1273--1290.
.
2019. Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. 28th USENIX Security Symposium (USENIX Security 19). :851--867.
.
2019. Triton: A Software-Reconfigurable Federated Avionics Testbed. 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19).
.
2019. Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
.
2017. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. 25th USENIX Security Symposium (USENIX Security 16). :1033--1050.
.
2016. Fast and Vulnerable: A Story of Telematic Failures. 9th USENIX Workshop on Offensive Technologies (WOOT 15).
.
2015. Measuring the Practical Impact of DNSSEC Deployment. 22nd USENIX Security Symposium (USENIX Security 13). :573--588.
.
2013. Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). :293--306.
.
2012. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. 21st USENIX Security Symposium (USENIX Security 12). :1--16.
.
2012. Comprehensive Experimental Analyses of Automotive Attack Surfaces. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks. 5th USENIX Workshop on Offensive Technologies (WOOT 11).
.
2011. No Plan Survives Contact: Experience with Cybercrime Measurement. 4th Workshop on Cyber Security Experimentation and Test (CSET 11).
.
2011. Show Me the Money: Characterizing Spam-advertised Revenue. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Measuring Online Service Availability Using Twitter. 3rd Workshop on Online Social Networks (WOSN 2010).
.
2010. Re: CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic Context. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments. 2010 USENIX Annual Technical Conference (USENIX ATC 10).
.
2010. Cumulus: Filesystem Backup to the Cloud. 7th USENIX Conference on File and Storage Technologies (FAST 09).
.
2009. Panel: Future Challenges to Cloud Computing. Workshop on Hot Topics in Cloud Computing (HotCloud 09).
.
2009. Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 09).
.
2009. Difference Engine: Harnessing Memory Redundancy in Virtual Machines. 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI 08).
.
2008. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
.
2008. On the Spam Campaign Trail. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
.
2008.