2009 |
58 | EE | Michael Vrable,
Stefan Savage,
Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud.
FAST 2009: 225-238 |
57 | EE | Alper Tugay Mizrak,
Stefan Savage,
Keith Marzullo:
Detecting Malicious Packet Losses.
IEEE Trans. Parallel Distrib. Syst. 20(2): 191-206 (2009) |
2008 |
56 | | Victor Bahl,
David Wetherall,
Stefan Savage,
Ion Stoica:
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008
ACM 2008 |
55 | EE | Erik Buchanan,
Ryan Roemer,
Hovav Shacham,
Stefan Savage:
When good instructions go bad: generalizing return-oriented programming to RISC.
ACM Conference on Computer and Communications Security 2008: 27-38 |
54 | EE | Chris Kanich,
Christian Kreibich,
Kirill Levchenko,
Brandon Enright,
Geoffrey M. Voelker,
Vern Paxson,
Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion.
ACM Conference on Computer and Communications Security 2008: 3-14 |
53 | EE | Benjamin Laxton,
Kai Wang,
Stefan Savage:
Reconsidering physical key secrecy: teleduplication via optical decoding.
ACM Conference on Computer and Communications Security 2008: 469-478 |
52 | EE | Christian Kreibich,
Chris Kanich,
Kirill Levchenko,
Brandon Enright,
Geoffrey M. Voelker,
Vern Paxson,
Stefan Savage:
On the Spam Campaign Trail.
LEET 2008 |
51 | EE | Chris Kanich,
Kirill Levchenko,
Brandon Enright,
Geoffrey M. Voelker,
Stefan Savage:
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
LEET 2008 |
50 | EE | Diwaker Gupta,
Sangmin Lee,
Michael Vrable,
Stefan Savage,
Alex C. Snoeren,
George Varghese,
Geoffrey M. Voelker,
Amin Vahdat:
Difference Engine: Harnessing Memory Redundancy in Virtual Machines.
OSDI 2008: 309-322 |
49 | EE | Kirill Levchenko,
Geoffrey M. Voelker,
Ramamohan Paturi,
Stefan Savage:
Xl: an efficient network routing algorithm.
SIGCOMM 2008: 15-26 |
48 | EE | Alper Tugay Mizrak,
Stefan Savage,
Keith Marzullo:
Detecting compromised routers via packet forwarding behavior.
IEEE Network 22(2): 34-39 (2008) |
2007 |
47 | EE | Yu-Chung Cheng,
Mikhail Afanasyev,
Patrick Verkaik,
Péter Benkö,
Jennifer Chiang,
Alex C. Snoeren,
Stefan Savage,
Geoffrey M. Voelker:
Automating cross-layer diagnosis of enterprise wireless networks.
SIGCOMM 2007: 25-36 |
2006 |
46 | EE | Justin Ma,
Kirill Levchenko,
Christian Kreibich,
Stefan Savage,
Geoffrey M. Voelker:
Unexpected means of protocol inference.
Internet Measurement Conference 2006: 313-326 |
45 | EE | Justin Ma,
John Dunagan,
Helen J. Wang,
Stefan Savage,
Geoffrey M. Voelker:
Finding diversity in remote code injection exploits.
Internet Measurement Conference 2006: 53-64 |
44 | EE | Yu-Chung Cheng,
John Bellardo,
Péter Benkö,
Alex C. Snoeren,
Geoffrey M. Voelker,
Stefan Savage:
Jigsaw: solving the puzzle of enterprise 802.11 analysis.
SIGCOMM 2006: 39-50 |
43 | EE | David Moore,
Colleen Shannon,
Douglas J. Brown,
Geoffrey M. Voelker,
Stefan Savage:
Inferring Internet denial-of-service activity.
ACM Trans. Comput. Syst. 24(2): 115-139 (2006) |
42 | EE | Alper Tugay Mizrak,
Yu-Chung Cheng,
Keith Marzullo,
Stefan Savage:
Detecting and Isolating Malicious Routers.
IEEE Trans. Dependable Sec. Comput. 3(3): 230-244 (2006) |
41 | EE | Fan R. K. Chung,
Ronald L. Graham,
Ranjita Bhagwan,
Stefan Savage,
Geoffrey M. Voelker:
Maximizing data locality in distributed systems.
J. Comput. Syst. Sci. 72(8): 1309-1316 (2006) |
2005 |
40 | EE | Alper Tugay Mizrak,
Yu-Chung Cheng,
Keith Marzullo,
Stefan Savage:
Fatih: Detecting and Isolating Malicious Routers.
DSN 2005: 538-547 |
39 | EE | Ishwar Ramani,
Stefan Savage:
SyncScan: practical fast handoff for 802.11 infrastructure networks.
INFOCOM 2005: 675-684 |
38 | EE | Michael Vrable,
Justin Ma,
Jay Chen,
David Moore,
Erik Vandekieft,
Alex C. Snoeren,
Geoffrey M. Voelker,
Stefan Savage:
Scalability, fidelity, and containment in the potemkin virtual honeyfarm.
SOSP 2005: 148-162 |
37 | EE | Justin Ma,
Geoffrey M. Voelker,
Stefan Savage:
Self-stopping worms.
WORM 2005: 12-21 |
36 | EE | Stefan Savage:
Scalable internet threat monitoring.
WORM 2005: 71 |
2004 |
35 | EE | Ranjita Bhagwan,
Kiran Tati,
Yu-Chung Cheng,
Stefan Savage,
Geoffrey M. Voelker:
Total Recall: System Support for Automated Availability Management.
NSDI 2004: 337-350 |
34 | EE | Sumeet Singh,
Cristian Estan,
George Varghese,
Stefan Savage:
Automated Worm Fingerprinting.
OSDI 2004: 45-60 |
33 | EE | Alper Tugay Mizrak,
Keith Marzullo,
Stefan Savage:
Brief announcement: detecting malicious routers.
PODC 2004: 369 |
32 | EE | Yu-Chung Cheng,
Urs Hölzle,
Neal Cardwell,
Stefan Savage,
Geoffrey M. Voelker:
Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying.
USENIX Annual Technical Conference, General Track 2004: 87-98 |
2003 |
31 | | Stuart Staniford,
Stefan Savage:
Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003
ACM Press 2003 |
30 | EE | Ranjita Bhagwan,
David Moore,
Stefan Savage,
Geoffrey M. Voelker:
Replication Strategies for Highly Available Peer-to-Peer Storage.
Future Directions in Distributed Computing 2003: 153-158 |
29 | | Flavio Paiva Junqueira,
Ranjita Bhagwan,
Keith Marzullo,
Stefan Savage,
Geoffrey M. Voelker:
The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe.
HotOS 2003: 73-78 |
28 | EE | David Moore,
Colleen Shannon,
Geoffrey M. Voelker,
Stefan Savage:
Internet Quarantine: Requirements for Containing Self-Propagating Code.
INFOCOM 2003 |
27 | EE | Ranjita Bhagwan,
Stefan Savage,
Geoffrey M. Voelker:
Understanding Availability.
IPTPS 2003: 256-267 |
26 | EE | Renata Teixeira,
Keith Marzullo,
Stefan Savage,
Geoffrey M. Voelker:
In search of path diversity in ISP networks.
Internet Measurement Comference 2003: 313-318 |
25 | EE | Cristian Estan,
Stefan Savage,
George Varghese:
Automatically inferring patterns of resource consumption in network traffic.
SIGCOMM 2003: 137-148 |
24 | EE | Renata Teixeira,
Keith Marzullo,
Stefan Savage,
Geoffrey M. Voelker:
Characterizing and measuring path diversity of internet topologies.
SIGMETRICS 2003: 304-305 |
23 | EE | David Moore,
Vern Paxson,
Stefan Savage,
Colleen Shannon,
Stuart Staniford-Chen,
Nicholas Weaver:
Inside the Slammer Worm.
IEEE Security & Privacy 1(4): 33-39 (2003) |
2002 |
22 | EE | Cristian Estan,
Stefan Savage,
George Varghese:
Automated measurement of high volume traffic clusters.
Internet Measurement Workshop 2002: 177-178 |
21 | EE | John Bellardo,
Stefan Savage:
Measuring packet reordering.
Internet Measurement Workshop 2002: 97-105 |
20 | EE | Eric J. Anderson,
Thomas E. Anderson,
Steven D. Gribble,
Anna R. Karlin,
Stefan Savage:
A quantitative evaluation of traffic-aware routing strategies.
Computer Communication Review 32(1): 67 (2002) |
2001 |
19 | EE | David Ely,
Neil Spring,
David Wetherall,
Stefan Savage,
Thomas E. Anderson:
Robust Congestion Signaling.
ICNP 2001: 332-341 |
18 | EE | David Ely,
Stefan Savage,
David Wetherall:
Alpine: A User-Level Infrastructure for Network Protocol Development.
USITS 2001 |
17 | EE | Stefan Savage,
David Wetherall,
Anna R. Karlin,
Thomas E. Anderson:
Network support for IP traceback.
IEEE/ACM Trans. Netw. 9(3): 226-237 (2001) |
2000 |
16 | EE | Amit Aggarwal,
Stefan Savage,
Thomas E. Anderson:
Understanding the Performance of TCP Pacing.
INFOCOM 2000: 1157-1165 |
15 | EE | Neal Cardwell,
Stefan Savage,
Thomas E. Anderson:
Modeling TCP Latency.
INFOCOM 2000: 1742-1751 |
14 | EE | Stefan Savage,
David Wetherall,
Anna R. Karlin,
Thomas E. Anderson:
Practical network support for IP traceback.
SIGCOMM 2000: 295-306 |
1999 |
13 | EE | Stefan Savage,
Andy Collins,
Eric Hoffman,
John Snell,
Thomas E. Anderson:
The End-to-End Effects of Internet Path Selection.
SIGCOMM 1999: 289-299 |
12 | EE | Stefan Savage:
Sting: A TCP-based Network Measurement Tool.
USENIX Symposium on Internet Technologies and Systems 1999 |
11 | EE | Stefan Savage,
Neal Cardwell,
Thomas E. Anderson:
The Case for Informed Transport Protocols.
Workshop on Hot Topics in Operating Systems 1999: 58-63 |
1997 |
10 | | Stefan Savage,
Michael Burrows,
Greg Nelson,
Patrick Sobalvarro,
Thomas E. Anderson:
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs.
SOSP 1997: 27-37 |
9 | EE | Stefan Savage,
Michael Burrows,
Greg Nelson,
Patrick Sobalvarro,
Thomas E. Anderson:
Eraser: A Dynamic Data Race Detector for Multithreaded Programs.
ACM Trans. Comput. Syst. 15(4): 391-411 (1997) |
1996 |
8 | | Stefan Savage,
John Wilkes:
AFRAID - A Frequently Redundant Array of Independent Disks.
USENIX Annual Technical Conference 1996: 27-39 |
1995 |
7 | | Brian N. Bershad,
Stefan Savage,
Przemyslaw Pardyak,
Emin Gün Sirer,
Marc E. Fiuczynski,
David Becker,
Craig Chambers,
Susan J. Eggers:
Extensibility, Safety and Performance in the SPIN Operating System.
SOSP 1995: 267-284 |
6 | | Brian N. Bershad,
Craig Chambers,
Susan J. Eggers,
Chris Maeda,
Dylan McNamee,
Przemyslaw Pardyak,
Stefan Savage,
Emin Gün Sirer:
SPIN - An Extensible Microkernel for Application-specific Operating System Services.
Operating Systems Review 29(1): 74-77 (1995) |
1994 |
5 | | Brian N. Bershad,
Craig Chambers,
Susan J. Eggers,
Chris Maeda,
Dylan McNamee,
Przemyslaw Pardyak,
Stefan Savage,
Emin Gün Sirer:
SPIN - An Extensible Microkernel for Application-specific Operating System Services.
ACM SIGOPS European Workshop 1994: 68-71 |
4 | | Clifford W. Mercer,
Stefan Savage,
Hideyuki Tokuda:
Processor Capacity Reserves: Operating System Support for Multimedia Applications.
ICMCS 1994: 90-99 |
3 | | Stefan Savage,
Brian N. Bershad:
Some Issues in the Design of an Extensible Operating System (Panel Statement).
OSDI 1994: 196 |
1993 |
2 | | Stefan Savage,
Hideyuki Tokuda:
Real Time - Mach Timers: Exporting Time to the User.
USENIX MACH Symposium 1993: 111-118 |
1 | | Clifford W. Mercer,
Stefan Savage,
Hideyuki Tokuda:
Processor Capacity Reserves: An Abstraction for Managing Processor Usage.
Workshop on Workstation Operating Systems 1993: 129-134 |