


Остановите войну!
for scientists:


default search action
Stefan Savage
Person information

- affiliation: University of California, San Diego, USA
- award: ACM Prize in Computing, 2015
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j27]Enze Liu
, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proc. Priv. Enhancing Technol. 2023(1): 207-224 (2023) - [c142]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. EuroS&P 2023: 373-391 - [c141]Enze Liu, Lu Sun, Alex Bellon, Grant Ho, Geoffrey M. Voelker, Stefan Savage, Imani N. S. Munyaka:
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender. SOUPS 2023: 77-95 - [c140]Evan Johnson, Evan Laufer, Zijie Zhao, Dan Gohman, Shravan Narayan, Stefan Savage, Deian Stefan, Fraser Brown:
WaVe: a verifiably secure WebAssembly sandboxing runtime. SP 2023: 2940-2955 - [c139]Ariana Mirian
, Alisha Ukani
, Ian D. Foster
, Gautam Akiwate
, Taner Halicioglu
, Cynthia T. Moore
, Alex C. Snoeren
, Geoffrey M. Voelker
, Stefan Savage
:
In the Line of Fire: Risks of DPI-triggered Data Collection. CSET @ USENIX Security Symposium 2023: 57-63 - [i4]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. CoRR abs/2302.07287 (2023) - 2022
- [j26]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring security practices. Commun. ACM 65(9): 93-102 (2022) - [c138]Audrey Randall, Wes Hardaker, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
The Challenges of Blockchain-Based Naming Systems for Malware Defenders. eCrime 2022: 1-14 - [c137]Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc claffy, Geoffrey M. Voelker, Stefan Savage:
Retroactive identification of targeted DNS infrastructure hijacking. IMC 2022: 14-32 - [c136]Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc claffy, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij
, Stefan Savage:
Where .ru?: assessing the impact of conflict on russian domain infrastructure. IMC 2022: 159-165 - [c135]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Measuring UID smuggling in the wild. IMC 2022: 230-243 - [c134]Antonia Affinito, Raffaele Sommese, Gautam Akiwate, Stefan Savage, kc claffy, Geoffrey M. Voelker, Alessio Botta, Mattijs Jonker:
Domain Name Lifetimes: Baseline and Threats. TMA 2022 - [i3]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoff Voelker, Stefan Savage, Aaron Schulman:
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild. CoRR abs/2203.10188 (2022) - 2021
- [c133]Enze Liu
, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker:
Who's got your mail?: characterizing mail service provider usage. Internet Measurement Conference 2021: 122-136 - [c132]Audrey Randall, Enze Liu
, Ramakrishna Padmanabhan, Gautam Akiwate, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Home is where the hijacking is: understanding DNS interception by residential routers. Internet Measurement Conference 2021: 390-397 - [c131]Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, Kimberly C. Claffy:
Risky BIZness: risks derived from registrar name management. Internet Measurement Conference 2021: 673-686 - [c130]Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, Deian Stefan:
Доверя'й, но проверя'й: SFI safety for native-compiled Wasm. NDSS 2021 - [c129]Vector Guo Li, Gautam Akiwate, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Clairvoyance: Inferring Blocklist Use on the Internet. PAM 2021: 57-75 - [c128]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - [c127]Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko:
Jetset: Targeted Firmware Rehosting for Embedded Systems. USENIX Security Symposium 2021: 321-338 - [c126]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. USENIX Security Symposium 2021: 3093-3110 - [c125]Anil Yelam, Shibani Subbareddy, Keerthana Ganesan, Stefan Savage, Ariana Mirian:
CoResident Evil: Covert Communication In The Cloud With Lambdas. WWW 2021: 1005-1016 - [i2]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement (Extended Report). CoRR abs/2105.13442 (2021) - 2020
- [c124]Audrey Randall, Enze Liu
, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers. Internet Measurement Conference 2020: 50-64 - [c123]Gautam Akiwate, Mattijs Jonker, Raffaele Sommese, Ian D. Foster
, Geoffrey M. Voelker, Stefan Savage, kc claffy:
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. Internet Measurement Conference 2020: 281-294
2010 – 2019
- 2019
- [c122]Stefan Savage, Ian Levy, Kobbi Nissim, Paul Ohm, Carmela Troncoso, Nicole Wong:
Surveillance and privacy in the public and private sectors: panel. CSLAW 2019: 1 - [c121]Ariana Mirian, Nikunj Bhagat, Caitlin Sadowski, Adrienne Porter Felt, Stefan Savage, Geoffrey M. Voelker:
Web feature deprecation: a case study for chrome. ICSE (SEIP) 2019: 302-311 - [c120]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring Security Practices and How They Impact Security. Internet Measurement Conference 2019: 36-49 - [c119]Sam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, Kirill Levchenko:
Triton: A Software-Reconfigurable Federated Avionics Testbed. CSET @ USENIX Security Symposium 2019 - [c118]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - [c117]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [c116]Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Kurt Thomas:
Hack for Hire: Exploring the Emerging Market for Account Hijacking. WWW 2019: 1279-1289 - [i1]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [c115]Stefan Savage:
Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion. CCS 2018: 1761-1774 - [c114]Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Following Their Footsteps: Characterizing Account Automation Abuse and Defenses. Internet Measurement Conference 2018: 43-55 - 2017
- [c113]Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren:
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research. CCS 2017: 1501-1513 - [c112]Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Alex C. Snoeren:
Tripwire: inferring internet site compromise. Internet Measurement Conference 2017: 341-354 - [c111]Wilson Lian, Hovav Shacham, Stefan Savage:
A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations. NDSS 2017 - [c110]Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz
, Stefan Savage:
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. IEEE Symposium on Security and Privacy 2017: 231-250 - [c109]Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser. CSET @ USENIX Security Symposium 2017 - 2016
- [j25]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - [c108]Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. USENIX Security Symposium 2016: 1033-1050 - [e5]Thorsten Holz, Stefan Savage:
25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX Association 2016 [contents] - 2015
- [c107]Ian D. Foster
, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko:
Security by Any Other Name: On the Effectiveness of Provider Based Email Security. CCS 2015: 450-464 - [c106]He Liu, Matthew K. Mukerjee, Conglong Li, Nicolas Feltman, George Papen, Stefan Savage, Srinivasan Seshan, Geoffrey M. Voelker, David G. Andersen, Michael Kaminsky, George Porter, Alex C. Snoeren:
Scheduling techniques for hybrid circuit/packet networks. CoNEXT 2015: 41:1-41:13 - [c105]Neha Chachra, Stefan Savage, Geoffrey M. Voelker:
Affiliate Crookies: Characterizing Affiliate Marketing Abuse. Internet Measurement Conference 2015: 41-47 - [c104]Suqi Liu, Ian D. Foster
, Stefan Savage, Geoffrey M. Voelker, Lawrence K. Saul:
Who is .com?: Learning to Parse WHOIS Records. Internet Measurement Conference 2015: 369-380 - [c103]Tristan Halvorson, Matthew F. Der, Ian D. Foster
, Stefan Savage, Lawrence K. Saul, Geoffrey M. Voelker:
From .academy to .zone: An Analysis of the New TLD Land Rush. Internet Measurement Conference 2015: 381-394 - [c102]Wilson Lian, Hovav Shacham, Stefan Savage:
Too LeJIT to Quit: Extending JIT Spraying to ARM. NDSS 2015 - [c101]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [c100]Ian D. Foster
, Andrew Prudhomme, Karl Koscher, Stefan Savage:
Fast and Vulnerable: A Story of Telematic Failures. WOOT 2015 - 2014
- [c99]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c98]Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan A. Mast
, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, Kirill Levchenko:
On The Security of Mobile Cockpit Information Systems. CCS 2014: 633-645 - [c97]Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage:
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild. Internet Measurement Conference 2014: 347-358 - [c96]David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Internet Measurement Conference 2014: 359-372 - [c95]Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Knock it off: profiling the online storefronts of counterfeit merchandise. KDD 2014: 1759-1768 - [c94]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - [c93]Tristan Halvorson, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
XXXtortion?: inferring registration intent in the .XXX TLD. WWW 2014: 901-912 - 2013
- [j24]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c92]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c91]Daniel Turner, Kirill Levchenko, Stefan Savage, Alex C. Snoeren:
A comparison of syslog and IS-IS for network failure analysis. Internet Measurement Conference 2013: 433-440 - [c90]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Juice: A Longitudinal Study of an SEO Botnet. NDSS 2013 - [c89]Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage:
Measuring the Practical Impact of DNSSEC Deployment. USENIX Security Symposium 2013: 573-588 - [p1]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten
, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - 2012
- [j23]Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage:
Return-Oriented Programming: Systems, Languages, and Applications. ACM Trans. Inf. Syst. Secur. 15(1): 2:1-2:34 (2012) - [j22]Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage:
Improving Software Diagnosability via Log Enhancement. ACM Trans. Comput. Syst. 30(1): 4:1-4:28 (2012) - [j21]Harsha V. Madhyastha, John McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, Amin Vahdat:
scc: Informed Provisioning of Storage for Cluster Applications. login Usenix Mag. 37(3) (2012) - [c88]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa
, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c87]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c86]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
BlueSky: a cloud-backed file system for the enterprise. FAST 2012: 19 - [c85]Harsha V. Madhyastha, John McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, Amin Vahdat:
scc: cluster storage provisioning informed by application characteristics and SLAs. FAST 2012: 23 - [c84]Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage:
Taster's choice: a comparative analysis of spam feeds. Internet Measurement Conference 2012: 427-440 - [c83]Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael Mihn-Jong Lee, Xiaoming Tang, Yuanyuan Zhou, Stefan Savage:
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. OSDI 2012: 293-306 - [c82]Feng Lu, Jiaqi Zhang, Stefan Savage:
When Good Services Go Wild: Reassembling Web Services for Unintended Purposes. HotSec 2012 - [c81]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - [c80]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - 2011
- [j20]Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. Commun. ACM 54(5): 78-87 (2011) - [j19]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3): 30:1-30:24 (2011) - [c79]Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage:
Improving software diagnosability via log enhancement. ASPLOS 2011: 3-14 - [c78]Sushma Nagesh Bannur, Lawrence K. Saul, Stefan Savage:
Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. AISec 2011: 1-10 - [c77]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Cloak and dagger: dynamics of web search cloaking. CCS 2011: 477-490 - [c76]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
An analysis of underground forums. Internet Measurement Conference 2011: 71-80 - [c75]Daniel Turner, Stefan Savage, Alex C. Snoeren:
On the empirical performance of self-calibrating WiFi location systems. LCN 2011: 76-84 - [c74]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c73]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c72]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - [c71]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - [c70]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c69]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. USENIX Security Symposium 2011 - [c68]Keaton Mowery, Sarah Meiklejohn, Stefan Savage:
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks. WOOT 2011: 46-53 - [c67]Qing Zhang, Thomas Ristenpart, Stefan Savage, Geoffrey M. Voelker:
Got traffic?: an evaluation of click traffic providers. WebQuality@WWW 2011: 19-26 - 2010
- [j18]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference engine: harnessing memory redundancy in virtual machines. Commun. ACM 53(10): 85-93 (2010) - [c66]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c65]Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond heuristics: learning to classify vulnerabilities and predict exploits. KDD 2010: 105-114 - [c64]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010 - [c63]Daniel Turner, Kirill Levchenko, Alex C. Snoeren, Stefan Savage:
California fault lines: understanding the causes and impact of network failures. SIGCOMM 2010: 315-326 - [c62]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462 - [c61]Yuvraj Agarwal, Stefan Savage, Rajesh Gupta:
SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments. USENIX Annual Technical Conference 2010 - [c60]Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. USENIX Security Symposium 2010: 435-462 - [c59]Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Neon: system support for derived data management. VEE 2010: 63-74 - [c58]Marti Motoyama, Brendan Meeder, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Measuring Online Service Availability Using Twitter. WOSN 2010
2000 – 2009
- 2009
- [j17]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009) - [j16]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem backup to the cloud. ACM Trans. Storage 5(4): 14:1-14:28 (2009) - [j15]Alper Tugay Mizrak, Stefan Savage, Keith Marzullo:
Detecting Malicious Packet Losses. IEEE Trans. Parallel Distributed Syst. 20(2): 191-206 (2009) - [j14]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference Engine. login Usenix Mag. 34(2) (2009) - [j13]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. login Usenix Mag. 34(4) (2009) - [c57]Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. CCS 2009: 199-212 - [c56]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. FAST 2009: 225-238 - [c55]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Identifying suspicious URLs: an application of large-scale online learning. ICML 2009: 681-688 - [c54]Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage:
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Internet Measurement Conference 2009: 15-27 - [c53]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond blacklists: learning to detect malicious web sites from suspicious URLs. KDD 2009: 1245-1254 - [c52]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 - [d1]