default search action
Stefan Savage
Person information
- affiliation: University of California, San Diego, USA
- award: ACM Prize in Computing, 2015
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Fabián E. Bustamante, John Doyle, Walter Willinger, Marwan Fayed, David L. Alderson, Steven H. Low, Stefan Savage, Henning Schulzrinne:
Towards Re-Architecting Today's Internet for Survivability: NSF Workshop Report. Comput. Commun. Rev. 54(2): 36-47 (2024) - [c146]Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, Liz Izhikevich:
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild. EuroS&P 2024: 95-113 - [c145]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. IMC 2024: 704-712 - [c144]Sumanth Rao, Enze Liu, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Unfiltered: Measuring Cloud-based Email Filtering Bypasses. WWW 2024: 1702-1711 - [i8]Alex Bellon, Miro Haller, Andrey Labunets, Enze Liu, Stefan Savage:
An Empirical Analysis on the Use and Reporting of National Security Letters. CoRR abs/2403.02768 (2024) - [i7]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. CoRR abs/2405.09757 (2024) - [i6]Enze Liu, Elisa Luo, Jian Chen Yan, Katherine Izhikevich, Stewart Grant, Deian Stefan, Geoffrey M. Voelker, Stefan Savage:
Count of Monte Crypto: Accounting-based Defenses for Cross-Chain Bridges. CoRR abs/2410.01107 (2024) - 2023
- [j27]Enze Liu, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proc. Priv. Enhancing Technol. 2023(1): 207-224 (2023) - [c143]Ariana Mirian, Grant Ho, Stefan Savage, Geoffrey M. Voelker:
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates. ACSAC 2023: 150-162 - [c142]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. EuroS&P 2023: 373-391 - [c141]Enze Liu, Lu Sun, Alex Bellon, Grant Ho, Geoffrey M. Voelker, Stefan Savage, Imani N. S. Munyaka:
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender. SOUPS 2023: 77-95 - [c140]Evan Johnson, Evan Laufer, Zijie Zhao, Dan Gohman, Shravan Narayan, Stefan Savage, Deian Stefan, Fraser Brown:
WaVe: a verifiably secure WebAssembly sandboxing runtime. SP 2023: 2940-2955 - [c139]Ariana Mirian, Alisha Ukani, Ian D. Foster, Gautam Akiwate, Taner Halicioglu, Cynthia T. Moore, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
In the Line of Fire: Risks of DPI-triggered Data Collection. CSET @ USENIX Security Symposium 2023: 57-63 - [i5]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. CoRR abs/2302.07287 (2023) - [i4]Katherine Izhikevich, Geoff Voelker, Stefan Savage, Liz Izhikevich:
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild. CoRR abs/2312.00580 (2023) - 2022
- [j26]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring security practices. Commun. ACM 65(9): 93-102 (2022) - [c138]Audrey Randall, Wes Hardaker, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
The Challenges of Blockchain-Based Naming Systems for Malware Defenders. eCrime 2022: 1-14 - [c137]Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc claffy, Geoffrey M. Voelker, Stefan Savage:
Retroactive identification of targeted DNS infrastructure hijacking. IMC 2022: 14-32 - [c136]Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc claffy, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij, Stefan Savage:
Where .ru?: assessing the impact of conflict on russian domain infrastructure. IMC 2022: 159-165 - [c135]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Measuring UID smuggling in the wild. IMC 2022: 230-243 - [c134]Antonia Affinito, Raffaele Sommese, Gautam Akiwate, Stefan Savage, kc claffy, Geoffrey M. Voelker, Alessio Botta, Mattijs Jonker:
Domain Name Lifetimes: Baseline and Threats. TMA 2022 - [i3]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoff Voelker, Stefan Savage, Aaron Schulman:
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild. CoRR abs/2203.10188 (2022) - 2021
- [c133]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker:
Who's got your mail?: characterizing mail service provider usage. Internet Measurement Conference 2021: 122-136 - [c132]Audrey Randall, Enze Liu, Ramakrishna Padmanabhan, Gautam Akiwate, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Home is where the hijacking is: understanding DNS interception by residential routers. Internet Measurement Conference 2021: 390-397 - [c131]Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, Kimberly C. Claffy:
Risky BIZness: risks derived from registrar name management. Internet Measurement Conference 2021: 673-686 - [c130]Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, Deian Stefan:
Доверя'й, но проверя'й: SFI safety for native-compiled Wasm. NDSS 2021 - [c129]Vector Guo Li, Gautam Akiwate, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Clairvoyance: Inferring Blocklist Use on the Internet. PAM 2021: 57-75 - [c128]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - [c127]Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko:
Jetset: Targeted Firmware Rehosting for Embedded Systems. USENIX Security Symposium 2021: 321-338 - [c126]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. USENIX Security Symposium 2021: 3093-3110 - [c125]Anil Yelam, Shibani Subbareddy, Keerthana Ganesan, Stefan Savage, Ariana Mirian:
CoResident Evil: Covert Communication In The Cloud With Lambdas. WWW 2021: 1005-1016 - [i2]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement (Extended Report). CoRR abs/2105.13442 (2021) - 2020
- [c124]Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers. Internet Measurement Conference 2020: 50-64 - [c123]Gautam Akiwate, Mattijs Jonker, Raffaele Sommese, Ian D. Foster, Geoffrey M. Voelker, Stefan Savage, kc claffy:
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. Internet Measurement Conference 2020: 281-294
2010 – 2019
- 2019
- [c122]Stefan Savage, Ian Levy, Kobbi Nissim, Paul Ohm, Carmela Troncoso, Nicole Wong:
Surveillance and privacy in the public and private sectors: panel. CSLAW 2019: 1 - [c121]Ariana Mirian, Nikunj Bhagat, Caitlin Sadowski, Adrienne Porter Felt, Stefan Savage, Geoffrey M. Voelker:
Web feature deprecation: a case study for chrome. ICSE (SEIP) 2019: 302-311 - [c120]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring Security Practices and How They Impact Security. Internet Measurement Conference 2019: 36-49 - [c119]Sam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, Kirill Levchenko:
Triton: A Software-Reconfigurable Federated Avionics Testbed. CSET @ USENIX Security Symposium 2019 - [c118]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - [c117]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [c116]Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Kurt Thomas:
Hack for Hire: Exploring the Emerging Market for Account Hijacking. WWW 2019: 1279-1289 - [i1]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [c115]Stefan Savage:
Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion. CCS 2018: 1761-1774 - [c114]Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Following Their Footsteps: Characterizing Account Automation Abuse and Defenses. Internet Measurement Conference 2018: 43-55 - 2017
- [c113]Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren:
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research. CCS 2017: 1501-1513 - [c112]Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Alex C. Snoeren:
Tripwire: inferring internet site compromise. Internet Measurement Conference 2017: 341-354 - [c111]Wilson Lian, Hovav Shacham, Stefan Savage:
A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations. NDSS 2017 - [c110]Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage:
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. IEEE Symposium on Security and Privacy 2017: 231-250 - [c109]Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser. CSET @ USENIX Security Symposium 2017 - 2016
- [j25]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - [c108]Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. USENIX Security Symposium 2016: 1033-1050 - [e5]Thorsten Holz, Stefan Savage:
25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX Association 2016 [contents] - 2015
- [c107]Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko:
Security by Any Other Name: On the Effectiveness of Provider Based Email Security. CCS 2015: 450-464 - [c106]He Liu, Matthew K. Mukerjee, Conglong Li, Nicolas Feltman, George Papen, Stefan Savage, Srinivasan Seshan, Geoffrey M. Voelker, David G. Andersen, Michael Kaminsky, George Porter, Alex C. Snoeren:
Scheduling techniques for hybrid circuit/packet networks. CoNEXT 2015: 41:1-41:13 - [c105]Neha Chachra, Stefan Savage, Geoffrey M. Voelker:
Affiliate Crookies: Characterizing Affiliate Marketing Abuse. Internet Measurement Conference 2015: 41-47 - [c104]Suqi Liu, Ian D. Foster, Stefan Savage, Geoffrey M. Voelker, Lawrence K. Saul:
Who is .com?: Learning to Parse WHOIS Records. Internet Measurement Conference 2015: 369-380 - [c103]Tristan Halvorson, Matthew F. Der, Ian D. Foster, Stefan Savage, Lawrence K. Saul, Geoffrey M. Voelker:
From .academy to .zone: An Analysis of the New TLD Land Rush. Internet Measurement Conference 2015: 381-394 - [c102]Wilson Lian, Hovav Shacham, Stefan Savage:
Too LeJIT to Quit: Extending JIT Spraying to ARM. NDSS 2015 - [c101]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [c100]Ian D. Foster, Andrew Prudhomme, Karl Koscher, Stefan Savage:
Fast and Vulnerable: A Story of Telematic Failures. WOOT 2015 - 2014
- [c99]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c98]Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan A. Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, Kirill Levchenko:
On The Security of Mobile Cockpit Information Systems. CCS 2014: 633-645 - [c97]Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage:
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild. Internet Measurement Conference 2014: 347-358 - [c96]David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Internet Measurement Conference 2014: 359-372 - [c95]Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Knock it off: profiling the online storefronts of counterfeit merchandise. KDD 2014: 1759-1768 - [c94]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - [c93]Tristan Halvorson, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
XXXtortion?: inferring registration intent in the .XXX TLD. WWW 2014: 901-912 - 2013
- [j24]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c92]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c91]Daniel Turner, Kirill Levchenko, Stefan Savage, Alex C. Snoeren:
A comparison of syslog and IS-IS for network failure analysis. Internet Measurement Conference 2013: 433-440 - [c90]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Juice: A Longitudinal Study of an SEO Botnet. NDSS 2013 - [c89]Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage:
Measuring the Practical Impact of DNSSEC Deployment. USENIX Security Symposium 2013: 573-588 - [p1]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - 2012
- [j23]Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage:
Return-Oriented Programming: Systems, Languages, and Applications. ACM Trans. Inf. Syst. Secur. 15(1): 2:1-2:34 (2012) - [j22]Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage:
Improving Software Diagnosability via Log Enhancement. ACM Trans. Comput. Syst. 30(1): 4:1-4:28 (2012) - [j21]Harsha V. Madhyastha, John McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, Amin Vahdat:
scc: Informed Provisioning of Storage for Cluster Applications. login Usenix Mag. 37(3) (2012) - [c88]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c87]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c86]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
BlueSky: a cloud-backed file system for the enterprise. FAST 2012: 19 - [c85]Harsha V. Madhyastha, John McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, Amin Vahdat:
scc: cluster storage provisioning informed by application characteristics and SLAs. FAST 2012: 23 - [c84]Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage:
Taster's choice: a comparative analysis of spam feeds. Internet Measurement Conference 2012: 427-440 - [c83]Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael Mihn-Jong Lee, Xiaoming Tang, Yuanyuan Zhou, Stefan Savage:
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. OSDI 2012: 293-306 - [c82]Feng Lu, Jiaqi Zhang, Stefan Savage:
When Good Services Go Wild: Reassembling Web Services for Unintended Purposes. HotSec 2012 - [c81]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - [c80]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - 2011
- [j20]Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. Commun. ACM 54(5): 78-87 (2011) - [j19]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3): 30:1-30:24 (2011) - [c79]Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage:
Improving software diagnosability via log enhancement. ASPLOS 2011: 3-14 - [c78]Sushma Nagesh Bannur, Lawrence K. Saul, Stefan Savage:
Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. AISec 2011: 1-10 - [c77]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Cloak and dagger: dynamics of web search cloaking. CCS 2011: 477-490 - [c76]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
An analysis of underground forums. Internet Measurement Conference 2011: 71-80 - [c75]Daniel Turner, Stefan Savage, Alex C. Snoeren:
On the empirical performance of self-calibrating WiFi location systems. LCN 2011: 76-84 - [c74]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c73]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c72]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - [c71]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - [c70]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c69]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. USENIX Security Symposium 2011 - [c68]Keaton Mowery, Sarah Meiklejohn, Stefan Savage:
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks. WOOT 2011: 46-53 - [c67]Qing Zhang, Thomas Ristenpart, Stefan Savage, Geoffrey M. Voelker:
Got traffic?: an evaluation of click traffic providers. WebQuality@WWW 2011: 19-26 - 2010
- [j18]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference engine: harnessing memory redundancy in virtual machines. Commun. ACM 53(10): 85-93 (2010) - [c66]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c65]Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond heuristics: learning to classify vulnerabilities and predict exploits. KDD 2010: 105-114 - [c64]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010 - [c63]Daniel Turner, Kirill Levchenko, Alex C. Snoeren, Stefan Savage:
California fault lines: understanding the causes and impact of network failures. SIGCOMM 2010: 315-326 - [c62]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462 - [c61]Yuvraj Agarwal, Stefan Savage, Rajesh Gupta:
SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments. USENIX ATC 2010 - [c60]Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. USENIX Security Symposium 2010: 435-462 - [c59]Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Neon: system support for derived data management. VEE 2010: 63-74 - [c58]Marti Motoyama, Brendan Meeder, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Measuring Online Service Availability Using Twitter. WOSN 2010
2000 – 2009
- 2009
- [j17]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009) - [j16]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem backup to the cloud. ACM Trans. Storage 5(4): 14:1-14:28 (2009) - [j15]Alper Tugay Mizrak, Stefan Savage, Keith Marzullo:
Detecting Malicious Packet Losses. IEEE Trans. Parallel Distributed Syst. 20(2): 191-206 (2009) - [j14]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference Engine. login Usenix Mag. 34(2) (2009) - [j13]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. login Usenix Mag. 34(4) (2009) - [c57]Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. CCS 2009: 199-212 - [c56]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. FAST 2009: 225-238 - [c55]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Identifying suspicious URLs: an application of large-scale online learning. ICML 2009: 681-688 - [c54]Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage:
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Internet Measurement Conference 2009: 15-27 - [c53]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond blacklists: learning to detect malicious web sites from suspicious URLs. KDD 2009: 1245-1254 - [c52]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 - [d1]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
URL Reputation. UCI Machine Learning Repository, 2009 - 2008
- [j12]Alper Tugay Mizrak, Stefan Savage, Keith Marzullo:
Detecting compromised routers via packet forwarding behavior. IEEE Netw. 22(2): 34-39 (2008) - [j11]Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, Kirill Levchenko:
Storm: When Researchers Collide. login Usenix Mag. 33(4) (2008) - [c51]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. CCS 2008: 3-14 - [c50]Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage:
When good instructions go bad: generalizing return-oriented programming to RISC. CCS 2008: 27-38 - [c49]Benjamin Laxton, Kai Wang, Stefan Savage:
Reconsidering physical key secrecy: teleduplication via optical decoding. CCS 2008: 469-478 - [c48]Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage:
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. LEET 2008 - [c47]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
On the Spam Campaign Trail. LEET 2008 - [c46]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference Engine: Harnessing Memory Redundancy in Virtual Machines. OSDI 2008: 309-322 - [c45]Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage:
Xl: an efficient network routing algorithm. SIGCOMM 2008: 15-26 - [e4]Victor Bahl, David Wetherall, Stefan Savage, Ion Stoica:
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008. ACM 2008, ISBN 978-1-60558-175-0 [contents] - 2007
- [c44]Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage:
An inquiry into the nature and causes of the wealth of internet miscreants. CCS 2007: 375-388 - [c43]Chris Fleizach, Geoffrey M. Voelker, Stefan Savage:
Slicing Spam with Occam's Razor. CEAS 2007 - [c42]Yuchung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker:
Automating cross-layer diagnosis of enterprise wireless networks. SIGCOMM 2007: 25-36 - [c41]David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker:
Spamscatter: Characterizing Internet Scam Hosting Infrastructure. USENIX Security Symposium 2007 - [e3]Constantine Dovrolis, Vern Paxson, Stefan Savage:
6th ACM Workshop on Hot Topics in Networks - HotNets-VI, Atlanta, Georgia, USA, November 14-15, 2007. ACM SIGCOMM 2007 [contents] - 2006
- [j10]Fan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker:
Maximizing data locality in distributed systems. J. Comput. Syst. Sci. 72(8): 1309-1316 (2006) - [j9]Alper Tugay Mizrak, Yuchung Cheng, Keith Marzullo, Stefan Savage:
Detecting and Isolating Malicious Routers. IEEE Trans. Dependable Secur. Comput. 3(3): 230-244 (2006) - [j8]David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage:
Inferring Internet denial-of-service activity. ACM Trans. Comput. Syst. 24(2): 115-139 (2006) - [c40]Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker:
Finding diversity in remote code injection exploits. Internet Measurement Conference 2006: 53-64 - [c39]Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker:
Unexpected means of protocol inference. Internet Measurement Conference 2006: 313-326 - [c38]Yuchung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM 2006: 39-50 - 2005
- [c37]Alper Tugay Mizrak, Yuchung Cheng, Keith Marzullo, Stefan Savage:
Fatih: Detecting and Isolating Malicious Routers. DSN 2005: 538-547 - [c36]Ishwar Ramani, Stefan Savage:
SyncScan: practical fast handoff for 802.11 infrastructure networks. INFOCOM 2005: 675-684 - [c35]Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SOSP 2005: 148-162 - [c34]Justin Ma, Geoffrey M. Voelker, Stefan Savage:
Self-stopping worms. WORM 2005: 12-21 - [c33]Stefan Savage:
Scalable internet threat monitoring. WORM 2005: 71 - 2004
- [c32]Ranjita Bhagwan, Kiran Tati, Yuchung Cheng, Stefan Savage, Geoffrey M. Voelker:
Total Recall: System Support for Automated Availability Management. NSDI 2004: 337-350 - [c31]Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage:
Automated Worm Fingerprinting. OSDI 2004: 45-60 - [c30]Alper Tugay Mizrak, Keith Marzullo, Stefan Savage:
Brief announcement: detecting malicious routers. PODC 2004: 369 - [c29]Yuchung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker:
Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. USENIX ATC, General Track 2004: 87-98 - [e2]Robert Tappan Morris, Stefan Savage:
1st Symposium on Networked Systems Design and Implementation (NSDI 2004), March 29-31, 2004, San Francisco, California, USA, Proceedings. USENIX 2004 [contents] - 2003
- [j7]David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver:
Inside the Slammer Worm. IEEE Secur. Priv. 1(4): 33-39 (2003) - [c28]Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker:
Replication Strategies for Highly Available Peer-to-Peer Storage. Future Directions in Distributed Computing 2003: 153-158 - [c27]Flavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker:
The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. HotOS 2003: 73-78 - [c26]Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker:
In search of path diversity in ISP networks. Internet Measurement Conference 2003: 313-318 - [c25]David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage:
Internet Quarantine: Requirements for Containing Self-Propagating Code. INFOCOM 2003: 1901-1910 - [c24]Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker:
Understanding Availability. IPTPS 2003: 256-267 - [c23]Cristian Estan, Stefan Savage, George Varghese:
Automatically inferring patterns of resource consumption in network traffic. SIGCOMM 2003: 137-148 - [c22]Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker:
Characterizing and measuring path diversity of internet topologies. SIGMETRICS 2003: 304-305 - [c21]John Bellardo, Stefan Savage:
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. USENIX Security Symposium 2003 - [e1]Stuart Staniford, Stefan Savage:
Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003. ACM Press 2003, ISBN 1-58113-785-0 [contents] - 2002
- [j6]Eric J. Anderson, Thomas E. Anderson, Steven D. Gribble, Anna R. Karlin, Stefan Savage:
A quantitative evaluation of traffic-aware routing strategies. Comput. Commun. Rev. 32(1): 67 (2002) - [c20]John Bellardo, Stefan Savage:
Measuring packet reordering. Internet Measurement Workshop 2002: 97-105 - [c19]Cristian Estan, Stefan Savage, George Varghese:
Automated measurement of high volume traffic clusters. Internet Measurement Workshop 2002: 177-178 - 2001
- [j5]Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson:
Network support for IP traceback. IEEE/ACM Trans. Netw. 9(3): 226-237 (2001) - [c18]David Ely, Neil Spring, David Wetherall, Stefan Savage, Thomas E. Anderson:
Robust Congestion Signaling. ICNP 2001: 332-341 - [c17]David Ely, Stefan Savage, David Wetherall:
Alpine: A User-Level Infrastructure for Network Protocol Development. USITS 2001 - [c16]David Moore, Geoffrey M. Voelker, Stefan Savage:
Inferring Internet Denial-of-Service Activity. USENIX Security Symposium 2001 - 2000
- [c15]Amit Aggarwal, Stefan Savage, Thomas E. Anderson:
Understanding the Performance of TCP Pacing. INFOCOM 2000: 1157-1165 - [c14]Neal Cardwell, Stefan Savage, Thomas E. Anderson:
Modeling TCP Latency. INFOCOM 2000: 1742-1751 - [c13]Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson:
Practical network support for IP traceback. SIGCOMM 2000: 295-306
1990 – 1999
- 1999
- [j4]Stefan Savage, Neal Cardwell, David Wetherall, Thomas E. Anderson:
TCP congestion control with a misbehaving receiver. Comput. Commun. Rev. 29(5): 71-78 (1999) - [j3]Stefan Savage, Thomas E. Anderson, Amit Aggarwal, David Becker, Neal Cardwell, Andy Collins, Eric Hoffman, John Snell, Amin Vahdat, Geoffrey M. Voelker, John Zahorjan:
Detour: informed Internet routing and transport. IEEE Micro 19(1): 50-59 (1999) - [c12]Stefan Savage, Neal Cardwell, Thomas E. Anderson:
The Case for Informed Transport Protocols. Workshop on Hot Topics in Operating Systems 1999: 58-63 - [c11]Stefan Savage, Andy Collins, Eric Hoffman, John Snell, Thomas E. Anderson:
The End-to-End Effects of Internet Path Selection. SIGCOMM 1999: 289-299 - [c10]Stefan Savage:
Sting: A TCP-based Network Measurement Tool. USENIX Symposium on Internet Technologies and Systems 1999 - 1997
- [j2]Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson:
Eraser: A Dynamic Data Race Detector for Multithreaded Programs. ACM Trans. Comput. Syst. 15(4): 391-411 (1997) - [c9]Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson:
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. SOSP 1997: 27-37 - 1996
- [c8]Stefan Savage, John Wilkes:
AFRAID - A Frequently Redundant Array of Independent Disks. USENIX ATC 1996: 27-39 - 1995
- [j1]Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer:
SPIN - An Extensible Microkernel for Application-specific Operating System Services. ACM SIGOPS Oper. Syst. Rev. 29(1): 74-77 (1995) - [c7]Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, David Becker, Marc E. Fiuczynski, Emin Gün Sirer:
Protection is a software issue. HotOS 1995: 62-65 - [c6]Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gün Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, Susan J. Eggers:
Extensibility, Safety and Performance in the SPIN Operating System. SOSP 1995: 267-284 - 1994
- [c5]Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda:
Processor Capacity Reserves: Operating System Support for Multimedia Applications. ICMCS 1994: 90-99 - [c4]Stefan Savage, Brian N. Bershad:
Some Issues in the Design of an Extensible Operating System (Panel Statement). OSDI 1994: 196 - [c3]Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer:
SPIN - An Extensible Microkernel for Application-specific Operating System Services. ACM SIGOPS European Workshop 1994: 68-71 - 1993
- [c2]Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda:
Processor Capacity Reserves: An Abstraction for Managing Processor Usage. Workshop on Workstation Operating Systems 1993: 129-134 - [c1]Stefan Savage, Hideyuki Tokuda:
Real Time - Mach Timers: Exporting Time to the User. USENIX MACH Symposium 1993: 111-118
Coauthor Index
aka: Geoff Voelker
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint