dblp.uni-trier.dewww.uni-trier.de

Stefan Savage Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
62EEMichael Vrable, Stefan Savage, Geoffrey M. Voelker: Cumulus: Filesystem Backup to the Cloud. FAST 2009: 225-238
61EEJustin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker: Identifying suspicious URLs: an application of large-scale online learning. ICML 2009: 86
60EEJustin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. KDD 2009: 1245-1254
59EEChris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009)
58EEAlper Tugay Mizrak, Stefan Savage, Keith Marzullo: Detecting Malicious Packet Losses. IEEE Trans. Parallel Distrib. Syst. 20(2): 191-206 (2009)
2008
57 Victor Bahl, David Wetherall, Stefan Savage, Ion Stoica: Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008 ACM 2008
56EEErik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage: When good instructions go bad: generalizing return-oriented programming to RISC. ACM Conference on Computer and Communications Security 2008: 27-38
55EEChris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: Spamalytics: an empirical analysis of spam marketing conversion. ACM Conference on Computer and Communications Security 2008: 3-14
54EEBenjamin Laxton, Kai Wang, Stefan Savage: Reconsidering physical key secrecy: teleduplication via optical decoding. ACM Conference on Computer and Communications Security 2008: 469-478
53EEChristian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: On the Spam Campaign Trail. LEET 2008
52EEChris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage: The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. LEET 2008
51EEDiwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat: Difference Engine: Harnessing Memory Redundancy in Virtual Machines. OSDI 2008: 309-322
50EEKirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage: Xl: an efficient network routing algorithm. SIGCOMM 2008: 15-26
49EEAlper Tugay Mizrak, Stefan Savage, Keith Marzullo: Detecting compromised routers via packet forwarding behavior. IEEE Network 22(2): 34-39 (2008)
2007
48EEChris Fleizach, Geoffrey M. Voelker, Stefan Savage: Slicing Spam with Occam's Razor. CEAS 2007
47EEYu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker: Automating cross-layer diagnosis of enterprise wireless networks. SIGCOMM 2007: 25-36
2006
46EEJustin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker: Unexpected means of protocol inference. Internet Measurement Conference 2006: 313-326
45EEJustin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker: Finding diversity in remote code injection exploits. Internet Measurement Conference 2006: 53-64
44EEYu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage: Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM 2006: 39-50
43EEDavid Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage: Inferring Internet denial-of-service activity. ACM Trans. Comput. Syst. 24(2): 115-139 (2006)
42EEAlper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage: Detecting and Isolating Malicious Routers. IEEE Trans. Dependable Sec. Comput. 3(3): 230-244 (2006)
41EEFan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker: Maximizing data locality in distributed systems. J. Comput. Syst. Sci. 72(8): 1309-1316 (2006)
2005
40EEAlper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage: Fatih: Detecting and Isolating Malicious Routers. DSN 2005: 538-547
39EEIshwar Ramani, Stefan Savage: SyncScan: practical fast handoff for 802.11 infrastructure networks. INFOCOM 2005: 675-684
38EEMichael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SOSP 2005: 148-162
37EEJustin Ma, Geoffrey M. Voelker, Stefan Savage: Self-stopping worms. WORM 2005: 12-21
36EEStefan Savage: Scalable internet threat monitoring. WORM 2005: 71
2004
35EERanjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, Geoffrey M. Voelker: Total Recall: System Support for Automated Availability Management. NSDI 2004: 337-350
34EESumeet Singh, Cristian Estan, George Varghese, Stefan Savage: Automated Worm Fingerprinting. OSDI 2004: 45-60
33EEAlper Tugay Mizrak, Keith Marzullo, Stefan Savage: Brief announcement: detecting malicious routers. PODC 2004: 369
32EEYu-Chung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker: Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. USENIX Annual Technical Conference, General Track 2004: 87-98
2003
31 Stuart Staniford, Stefan Savage: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003 ACM Press 2003
30EERanjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker: Replication Strategies for Highly Available Peer-to-Peer Storage. Future Directions in Distributed Computing 2003: 153-158
29 Flavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker: The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. HotOS 2003: 73-78
28EEDavid Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage: Internet Quarantine: Requirements for Containing Self-Propagating Code. INFOCOM 2003
27EERanjita Bhagwan, Stefan Savage, Geoffrey M. Voelker: Understanding Availability. IPTPS 2003: 256-267
26EERenata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker: In search of path diversity in ISP networks. Internet Measurement Comference 2003: 313-318
25EECristian Estan, Stefan Savage, George Varghese: Automatically inferring patterns of resource consumption in network traffic. SIGCOMM 2003: 137-148
24EERenata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker: Characterizing and measuring path diversity of internet topologies. SIGMETRICS 2003: 304-305
23EEDavid Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver: Inside the Slammer Worm. IEEE Security & Privacy 1(4): 33-39 (2003)
2002
22EECristian Estan, Stefan Savage, George Varghese: Automated measurement of high volume traffic clusters. Internet Measurement Workshop 2002: 177-178
21EEJohn Bellardo, Stefan Savage: Measuring packet reordering. Internet Measurement Workshop 2002: 97-105
20EEEric J. Anderson, Thomas E. Anderson, Steven D. Gribble, Anna R. Karlin, Stefan Savage: A quantitative evaluation of traffic-aware routing strategies. Computer Communication Review 32(1): 67 (2002)
2001
19EEDavid Ely, Neil Spring, David Wetherall, Stefan Savage, Thomas E. Anderson: Robust Congestion Signaling. ICNP 2001: 332-341
18EEDavid Ely, Stefan Savage, David Wetherall: Alpine: A User-Level Infrastructure for Network Protocol Development. USITS 2001
17EEStefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson: Network support for IP traceback. IEEE/ACM Trans. Netw. 9(3): 226-237 (2001)
2000
16EEAmit Aggarwal, Stefan Savage, Thomas E. Anderson: Understanding the Performance of TCP Pacing. INFOCOM 2000: 1157-1165
15EENeal Cardwell, Stefan Savage, Thomas E. Anderson: Modeling TCP Latency. INFOCOM 2000: 1742-1751
14EEStefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson: Practical network support for IP traceback. SIGCOMM 2000: 295-306
1999
13EEStefan Savage, Andy Collins, Eric Hoffman, John Snell, Thomas E. Anderson: The End-to-End Effects of Internet Path Selection. SIGCOMM 1999: 289-299
12EEStefan Savage: Sting: A TCP-based Network Measurement Tool. USENIX Symposium on Internet Technologies and Systems 1999
11EEStefan Savage, Neal Cardwell, Thomas E. Anderson: The Case for Informed Transport Protocols. Workshop on Hot Topics in Operating Systems 1999: 58-63
1997
10 Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson: Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. SOSP 1997: 27-37
9EEStefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson: Eraser: A Dynamic Data Race Detector for Multithreaded Programs. ACM Trans. Comput. Syst. 15(4): 391-411 (1997)
1996
8 Stefan Savage, John Wilkes: AFRAID - A Frequently Redundant Array of Independent Disks. USENIX Annual Technical Conference 1996: 27-39
1995
7 Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gün Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, Susan J. Eggers: Extensibility, Safety and Performance in the SPIN Operating System. SOSP 1995: 267-284
6 Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer: SPIN - An Extensible Microkernel for Application-specific Operating System Services. Operating Systems Review 29(1): 74-77 (1995)
1994
5 Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer: SPIN - An Extensible Microkernel for Application-specific Operating System Services. ACM SIGOPS European Workshop 1994: 68-71
4 Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda: Processor Capacity Reserves: Operating System Support for Multimedia Applications. ICMCS 1994: 90-99
3 Stefan Savage, Brian N. Bershad: Some Issues in the Design of an Extensible Operating System (Panel Statement). OSDI 1994: 196
1993
2 Stefan Savage, Hideyuki Tokuda: Real Time - Mach Timers: Exporting Time to the User. USENIX MACH Symposium 1993: 111-118
1 Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda: Processor Capacity Reserves: An Abstraction for Managing Processor Usage. Workshop on Workstation Operating Systems 1993: 129-134

Coauthor Index

1Mikhail Afanasyev [47]
2Amit Aggarwal [16]
3Eric J. Anderson [20]
4Thomas E. Anderson [9] [10] [11] [13] [14] [15] [16] [17] [19] [20]
5Paramvir Bahl (Victor Bahl) [57]
6David Becker [7]
7John Bellardo [21] [44]
8Péter Benkö [44] [47]
9Brian N. Bershad [3] [5] [6] [7]
10Ranjita Bhagwan [27] [29] [30] [35] [41]
11Douglas J. Brown [43]
12Erik Buchanan [56]
13Michael Burrows [9] [10]
14Neal Cardwell [11] [15] [32]
15Craig Chambers [5] [6] [7]
16Jay Chen [38]
17Yu-Chung Cheng [32] [35] [40] [42] [44] [47]
18Jennifer Chiang [47]
19Fan R. K. Chung (Fan Chung Graham) [41]
20Andy Collins [13]
21John Dunagan [45]
22Susan J. Eggers [5] [6] [7]
23David Ely [18] [19]
24Brandon Enright [52] [53] [55] [59]
25Cristian Estan [22] [25] [34]
26Marc E. Fiuczynski [7]
27Chris Fleizach [48]
28Ronald L. Graham [41]
29Steven D. Gribble [20]
30Diwaker Gupta [51]
31Eric Hoffman [13]
32Urs Hölzle [32]
33Flavio Paiva Junqueira (Flavio Junqueira) [29]
34Chris Kanich [52] [53] [55] [59]
35Anna R. Karlin [14] [17] [20]
36Christian Kreibich [46] [53] [55] [59]
37Benjamin Laxton [54]
38Sangmin Lee [51]
39Kirill Levchenko [46] [50] [52] [53] [55] [59]
40Justin Ma [37] [38] [45] [46] [60] [61]
41Chris Maeda [5] [6]
42Keith Marzullo [24] [26] [29] [33] [40] [42] [49] [58]
43Dylan McNamee [5] [6]
44Clifford W. Mercer [1] [4]
45Alper Tugay Mizrak [33] [40] [42] [49] [58]
46David Moore [23] [28] [30] [38] [43]
47Greg Nelson [9] [10]
48Przemyslaw Pardyak [5] [6] [7]
49Ramamohan Paturi [50]
50Vern Paxson [23] [53] [55] [59]
51Ishwar Ramani [39]
52Ryan Roemer [56]
53Lawrence K. Saul [60] [61]
54Hovav Shacham [56]
55Colleen Shannon [23] [28] [43]
56Sumeet Singh [34]
57Emin Gün Sirer [5] [6] [7]
58John Snell [13]
59Alex C. Snoeren [38] [44] [47] [51]
60Patrick Sobalvarro [9] [10]
61Neil Spring (Neil T. Spring) [19]
62Stuart Staniford-Chen (Stuart Staniford) [23] [31]
63Ion Stoica [57]
64Kiran Tati [35]
65Renata Teixeira [24] [26]
66Hideyuki Tokuda [1] [2] [4]
67Amin Vahdat [51]
68Erik Vandekieft [38]
69George Varghese [22] [25] [34] [51]
70Patrick Verkaik [47]
71Geoffrey M. Voelker [24] [26] [27] [28] [29] [30] [32] [35] [37] [38] [41] [43] [44] [45] [46] [47] [48] [50] [51] [52] [53] [55] [59] [60] [61] [62]
72Michael Vrable [38] [51] [62]
73Helen J. Wang [45]
74Kai Wang [54]
75Nicholas Weaver [23]
76David Wetherall [14] [17] [18] [19] [57]
77John Wilkes [8]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)