2012
93Manufacturing compromise: the emergence of exploit-as-a-service. Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker. ACM Conference on Computer and Communications Security 2012, 821-832. Web SearchBibTeXDownload
92Priceless: the role of payments in abuse-advertised goods. Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage. ACM Conference on Computer and Communications Security 2012, 845-856. Web SearchBibTeXDownload
91Improving Software Diagnosability via Log Enhancement. Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage. ACM Trans. Comput. Syst. (30): 4 (2012). Web SearchBibTeXDownload
90Return-Oriented Programming: Systems, Languages, and Applications. Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage. ACM Trans. Inf. Syst. Secur. (15): 2 (2012). Web SearchBibTeXDownload
89Taster's choice: a comparative analysis of spam feeds. Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage. Internet Measurement Conference 2012, 427-440. Web SearchBibTeXDownload
88Measuring the Cost of Cybercrime. Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michael van Eeten, Michael Levi, Tyler Moore, Stefan Savage. WEIS 2012. Web SearchBibTeXDownload
2011
87Cloak and dagger: dynamics of web search cloaking. David Y. Wang, Stefan Savage, Geoffrey M. Voelker. ACM Conference on Computer and Communications Security 2011, 477-490. Web SearchBibTeXDownload
86Learning to detect malicious URLs. Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker. ACM TIST (2): 30 (2011). Web SearchBibTeXDownload
85Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. Sushma Nagesh Bannur, Lawrence K. Saul, Stefan Savage. AISec 2011, 1-10. Web SearchBibTeXDownload
84Improving software diagnosability via log enhancement. Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage. ASPLOS 2011, 3-14. Web SearchBibTeXDownload
83Privacy-preserving network forensics. Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker. Commun. ACM (54): 78-87 (2011). Web SearchBibTeXDownload
82Click Trajectories: End-to-End Analysis of the Spam Value Chain. Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyhárkzi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage. IEEE Symposium on Security and Privacy 2011, 431-446. Web SearchBibTeXDownload
81An analysis of underground forums. Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker. Internet Measurement Conference 2011, 71-80. Web SearchBibTeXDownload
80On the empirical performance of self-calibrating WiFi location systems. Daniel Turner, Stefan Savage, Alex C. Snoeren. LCN 2011, 76-84. Web SearchBibTeXDownload
79DefenestraTor: Throwing Out Windows in Tor. Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker. PETS 2011, 134-154. Web SearchBibTeXDownload
78Show Me the Money: Characterizing Spam-advertised Revenue. Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage. USENIX Security Symposium 2011. Web SearchBibTeXDownload
77Comprehensive Experimental Analyses of Automotive Attack Surfaces. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno. USENIX Security Symposium 2011. Web SearchBibTeXDownload
76Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker. USENIX Security Symposium 2011. Web SearchBibTeXDownload
75Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks. Keaton Mowery, Sarah Meiklejohn, Stefan Savage. WOOT 2011, 46-53. Web SearchBibTeXDownload
2010
74Difference engine: harnessing memory redundancy in virtual machines. Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat. Commun. ACM (53): 85-93 (2010). Web SearchBibTeXDownload
73How to tell an airport from a home: techniques and applications. Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage. HotNets 2010, 13. Web SearchBibTeXDownload
72Experimental Security Analysis of a Modern Automobile. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage. IEEE Symposium on Security and Privacy 2010, 447-462. Web SearchBibTeXDownload
71Beyond heuristics: learning to classify vulnerabilities and predict exploits. Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker. KDD 2010, 105-114. Web SearchBibTeXDownload
70Botnet Judo: Fighting Spam with Itself. Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage. NDSS 2010. Web SearchBibTeXDownload
69California fault lines: understanding the causes and impact of network failures. Daniel Turner, Kirill Levchenko, Alex C. Snoeren, Stefan Savage. SIGCOMM 2010, 315-326. Web SearchBibTeXDownload
68Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage. USENIX Security Symposium 2010, 435-462. Web SearchBibTeXDownload
67Neon: system support for derived data management. Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. VEE 2010, 63-74. Web SearchBibTeXDownload
2009
66Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage. ACM Conference on Computer and Communications Security 2009, 199-212. Web SearchBibTeXDownload
65Spamalytics: an empirical analysis of spam marketing conversion. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. Commun. ACM (52): 99-107 (2009). Web SearchBibTeXDownload
64Cumulus: Filesystem Backup to the Cloud. Michael Vrable, Stefan Savage, Geoffrey M. Voelker. FAST 2009, 225-238. Web SearchBibTeXDownload
63Identifying suspicious URLs: an application of large-scale online learning. Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker. ICML 2009, 86. Web SearchBibTeXDownload
62Detecting Malicious Packet Losses. Alper Tugay Mizrak, Stefan Savage, Keith Marzullo. IEEE Trans. Parallel Distrib. Syst. (20): 191-206 (2009). Web SearchBibTeXDownload
61When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage. Internet Measurement Conference 2009, 15-27. Web SearchBibTeXDownload
60Beyond blacklists: learning to detect malicious web sites from suspicious URLs. Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker. KDD 2009, 1245-1254. Web SearchBibTeXDownload
59Cumulus: Filesystem backup to the cloud. Michael Vrable, Stefan Savage, Geoffrey M. Voelker. TOS (5) (2009). Web SearchBibTeXDownload
2008
58Reconsidering physical key secrecy: teleduplication via optical decoding. Benjamin Laxton, Kai Wang, Stefan Savage. ACM Conference on Computer and Communications Security 2008, 469-478. Web SearchBibTeXDownload
57Spamalytics: an empirical analysis of spam marketing conversion. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. ACM Conference on Computer and Communications Security 2008, 3-14. Web SearchBibTeXDownload
56When good instructions go bad: generalizing return-oriented programming to RISC. Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage. ACM Conference on Computer and Communications Security 2008, 27-38. Web SearchBibTeXDownload
55Detecting compromised routers via packet forwarding behavior. Alper Tugay Mizrak, Stefan Savage, Keith Marzullo. IEEE Network (22): 34-39 (2008). Web SearchBibTeXDownload
54On the Spam Campaign Trail. Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. LEET 2008. Web SearchBibTeXDownload
53The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage. LEET 2008. Web SearchBibTeXDownload
52Difference Engine: Harnessing Memory Redundancy in Virtual Machines. Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat. OSDI 2008, 309-322. Web SearchBibTeXDownload
51Xl: an efficient network routing algorithm. Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage. SIGCOMM 2008, 15-26. Web SearchBibTeXDownload
2007
50An inquiry into the nature and causes of the wealth of internet miscreants. Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage. ACM Conference on Computer and Communications Security 2007, 375-388. Web SearchBibTeXDownload
49Slicing Spam with Occam's Razor. Chris Fleizach, Geoffrey M. Voelker, Stefan Savage. CEAS 2007. Web SearchBibTeXDownload
48Automating cross-layer diagnosis of enterprise wireless networks. Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker. SIGCOMM 2007, 25-36. Cited by 23Web SearchBibTeXDownload
2006
47Inferring Internet denial-of-service activity. David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage. ACM Trans. Comput. Syst. (24): 115-139 (2006). Web SearchBibTeXDownload
46Detecting and Isolating Malicious Routers. Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage. IEEE Trans. Dependable Sec. Comput. (3): 230-244 (2006). Web SearchBibTeXDownload
45Finding diversity in remote code injection exploits. Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker. Internet Measurement Conference 2006, 53-64. Web SearchBibTeXDownload
44Unexpected means of protocol inference. Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker. Internet Measurement Conference 2006, 313-326. Web SearchBibTeXDownload
43Maximizing data locality in distributed systems. Fan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker. J. Comput. Syst. Sci. (72): 1309-1316 (2006). Web SearchBibTeXDownload
42Jigsaw: solving the puzzle of enterprise 802.11 analysis. Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. SIGCOMM 2006, 39-50. Web SearchBibTeXDownload
2005
41Fatih: Detecting and Isolating Malicious Routers. Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage. DSN 2005, 538-547. Web SearchBibTeXDownload
40SyncScan: practical fast handoff for 802.11 infrastructure networks. Ishwar Ramani, Stefan Savage. INFOCOM 2005, 675-684. Web SearchBibTeXDownload
39Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. SOSP 2005, 148-162. Web SearchBibTeXDownload
38Scalable internet threat monitoring. Stefan Savage. WORM 2005, 71. Web SearchBibTeXDownload
37Self-stopping worms. Justin Ma, Geoffrey M. Voelker, Stefan Savage. WORM 2005, 12-21. Web SearchBibTeXDownload
2004
36Total Recall: System Support for Automated Availability Management. Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, Geoffrey M. Voelker. NSDI 2004, 337-350. Web SearchBibTeXDownload
35Automated Worm Fingerprinting. Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage. OSDI 2004, 45-60. Web SearchBibTeXDownload
34Brief announcement: detecting malicious routers. Alper Tugay Mizrak, Keith Marzullo, Stefan Savage. PODC 2004, 369. Web SearchBibTeXDownload
33Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. Yu-Chung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker. USENIX Annual Technical Conference, General Track 2004, 87-98. Web SearchBibTeXDownload
2003
32Replication Strategies for Highly Available Peer-to-Peer Storage. Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker. Future Directions in Distributed Computing 2003, 153-158. Web SearchBibTeXDownload
31The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. Flavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker. HotOS 2003, 73-78. Web SearchBibTeX
30Inside the Slammer Worm. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver. IEEE Security & Privacy (1): 33-39 (2003). Web SearchBibTeXDownload
29Internet Quarantine: Requirements for Containing Self-Propagating Code. David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage. INFOCOM 2003. Web SearchBibTeXDownload
28In search of path diversity in ISP networks. Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker. Internet Measurement Comference 2003, 313-318. Web SearchBibTeXDownload
27Understanding Availability. Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker. IPTPS 2003, 256-267. Web SearchBibTeXDownload
26Automatically inferring patterns of resource consumption in network traffic. Cristian Estan, Stefan Savage, George Varghese. SIGCOMM 2003, 137-148. Web SearchBibTeXDownload
25Characterizing and measuring path diversity of internet topologies. Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker. SIGMETRICS 2003, 304-305. Web SearchBibTeXDownload
2002
24A quantitative evaluation of traffic-aware routing strategies. Eric J. Anderson, Thomas E. Anderson, Steven D. Gribble, Anna R. Karlin, Stefan Savage. Computer Communication Review (32): 67 (2002). Web SearchBibTeXDownload
23Automated measurement of high volume traffic clusters. Cristian Estan, Stefan Savage, George Varghese. Internet Measurement Workshop 2002, 177-178. Web SearchBibTeXDownload
22Measuring packet reordering. John Bellardo, Stefan Savage. Internet Measurement Workshop 2002, 97-105. Web SearchBibTeXDownload
2001
21Robust Congestion Signaling. David Ely, Neil Spring, David Wetherall, Stefan Savage, Thomas E. Anderson. ICNP 2001, 332-341. Web SearchBibTeXDownload
20Network support for IP traceback. Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson. IEEE/ACM Trans. Netw. (9): 226-237 (2001). Web SearchBibTeXDownload
19Inferring Internet Denial-of-Service Activity. David Moore, Geoffrey M. Voelker, Stefan Savage. USENIX Security Symposium 2001. Web SearchBibTeXDownload
18Alpine: A User-Level Infrastructure for Network Protocol Development. David Ely, Stefan Savage, David Wetherall. USITS 2001. Web SearchBibTeXDownload
2000
17Modeling TCP Latency. Neal Cardwell, Stefan Savage, Thomas E. Anderson. INFOCOM 2000, 1742-1751. Web SearchBibTeXDownload
16Understanding the Performance of TCP Pacing. Amit Aggarwal, Stefan Savage, Thomas E. Anderson. INFOCOM 2000, 1157-1165. Web SearchBibTeXDownload
15Practical network support for IP traceback. Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson. SIGCOMM 2000, 295-306. Web SearchBibTeXDownload
1999
14TCP congestion control with a misbehaving receiver. Stefan Savage, Neal Cardwell, David Wetherall, Tom Anderson. Computer Communication Review (29): 71-78 (1999). Web SearchBibTeXDownload
13The End-to-End Effects of Internet Path Selection. Stefan Savage, Andy Collins, Eric Hoffman, John Snell, Thomas E. Anderson. SIGCOMM 1999, 289-299. Web SearchBibTeXDownload
12Sting: A TCP-based Network Measurement Tool. Stefan Savage. USENIX Symposium on Internet Technologies and Systems 1999. Web SearchBibTeXDownload
11The Case for Informed Transport Protocols. Stefan Savage, Neal Cardwell, Thomas E. Anderson. Workshop on Hot Topics in Operating Systems 1999, 58-63. Web SearchBibTeXDownload
1997
10Eraser: A Dynamic Data Race Detector for Multithreaded Programs. Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson. ACM Trans. Comput. Syst. (15): 391-411 (1997). Web SearchBibTeXDownload
9Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson. SOSP 1997, 27-37. Web SearchBibTeXDownload
1996
8AFRAID - A Frequently Redundant Array of Independent Disks. Stefan Savage, John Wilkes. USENIX Annual Technical Conference 1996, 27-39. Web SearchBibTeX
1995
7SPIN - An Extensible Microkernel for Application-specific Operating System Services. Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer. Operating Systems Review (29): 74-77 (1995). Web SearchBibTeXDownload
6Extensibility, Safety and Performance in the SPIN Operating System. Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gün Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, Susan J. Eggers. SOSP 1995, 267-284. Web SearchBibTeXDownload
1994
5SPIN - An Extensible Microkernel for Application-specific Operating System Services. Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer. ACM SIGOPS European Workshop 1994, 68-71. Web SearchBibTeX
4Processor Capacity Reserves: Operating System Support for Multimedia Applications. Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda. ICMCS 1994, 90-99. Web SearchBibTeX
3Some Issues in the Design of an Extensible Operating System (Panel Statement). Stefan Savage, Brian N. Bershad. OSDI 1994, 196. Web SearchBibTeX
1993
2Real Time - Mach Timers: Exporting Time to the User. Stefan Savage, Hideyuki Tokuda. USENIX MACH Symposium 1993, 111-118. Web SearchBibTeX
1Processor Capacity Reserves: An Abstraction for Managing Processor Usage. Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda. Workshop on Workstation Operating Systems 1993, 129-134. Web SearchBibTeX
from DBLP and Google Scholar

Related People

Related Topics

Developed by the Database Group at the University of Wisconsin and Yahoo! Research