2009 | ||
---|---|---|
58 | EE | Michael Vrable, Stefan Savage, Geoffrey M. Voelker: Cumulus: Filesystem Backup to the Cloud. FAST 2009: 225-238 |
57 | EE | Alper Tugay Mizrak, Stefan Savage, Keith Marzullo: Detecting Malicious Packet Losses. IEEE Trans. Parallel Distrib. Syst. 20(2): 191-206 (2009) |
2008 | ||
56 | Victor Bahl, David Wetherall, Stefan Savage, Ion Stoica: Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008 ACM 2008 | |
55 | EE | Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage: When good instructions go bad: generalizing return-oriented programming to RISC. ACM Conference on Computer and Communications Security 2008: 27-38 |
54 | EE | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: Spamalytics: an empirical analysis of spam marketing conversion. ACM Conference on Computer and Communications Security 2008: 3-14 |
53 | EE | Benjamin Laxton, Kai Wang, Stefan Savage: Reconsidering physical key secrecy: teleduplication via optical decoding. ACM Conference on Computer and Communications Security 2008: 469-478 |
52 | EE | Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage: On the Spam Campaign Trail. LEET 2008 |
51 | EE | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage: The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. LEET 2008 |
50 | EE | Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat: Difference Engine: Harnessing Memory Redundancy in Virtual Machines. OSDI 2008: 309-322 |
49 | EE | Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage: Xl: an efficient network routing algorithm. SIGCOMM 2008: 15-26 |
48 | EE | Alper Tugay Mizrak, Stefan Savage, Keith Marzullo: Detecting compromised routers via packet forwarding behavior. IEEE Network 22(2): 34-39 (2008) |
2007 | ||
47 | EE | Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker: Automating cross-layer diagnosis of enterprise wireless networks. SIGCOMM 2007: 25-36 |
2006 | ||
46 | EE | Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker: Unexpected means of protocol inference. Internet Measurement Conference 2006: 313-326 |
45 | EE | Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker: Finding diversity in remote code injection exploits. Internet Measurement Conference 2006: 53-64 |
44 | EE | Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage: Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM 2006: 39-50 |
43 | EE | David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage: Inferring Internet denial-of-service activity. ACM Trans. Comput. Syst. 24(2): 115-139 (2006) |
42 | EE | Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage: Detecting and Isolating Malicious Routers. IEEE Trans. Dependable Sec. Comput. 3(3): 230-244 (2006) |
41 | EE | Fan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker: Maximizing data locality in distributed systems. J. Comput. Syst. Sci. 72(8): 1309-1316 (2006) |
2005 | ||
40 | EE | Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage: Fatih: Detecting and Isolating Malicious Routers. DSN 2005: 538-547 |
39 | EE | Ishwar Ramani, Stefan Savage: SyncScan: practical fast handoff for 802.11 infrastructure networks. INFOCOM 2005: 675-684 |
38 | EE | Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SOSP 2005: 148-162 |
37 | EE | Justin Ma, Geoffrey M. Voelker, Stefan Savage: Self-stopping worms. WORM 2005: 12-21 |
36 | EE | Stefan Savage: Scalable internet threat monitoring. WORM 2005: 71 |
2004 | ||
35 | EE | Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, Geoffrey M. Voelker: Total Recall: System Support for Automated Availability Management. NSDI 2004: 337-350 |
34 | EE | Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage: Automated Worm Fingerprinting. OSDI 2004: 45-60 |
33 | EE | Alper Tugay Mizrak, Keith Marzullo, Stefan Savage: Brief announcement: detecting malicious routers. PODC 2004: 369 |
32 | EE | Yu-Chung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker: Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. USENIX Annual Technical Conference, General Track 2004: 87-98 |
2003 | ||
31 | Stuart Staniford, Stefan Savage: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003 ACM Press 2003 | |
30 | EE | Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker: Replication Strategies for Highly Available Peer-to-Peer Storage. Future Directions in Distributed Computing 2003: 153-158 |
29 | Flavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker: The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. HotOS 2003: 73-78 | |
28 | EE | David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage: Internet Quarantine: Requirements for Containing Self-Propagating Code. INFOCOM 2003 |
27 | EE | Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker: Understanding Availability. IPTPS 2003: 256-267 |
26 | EE | Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker: In search of path diversity in ISP networks. Internet Measurement Comference 2003: 313-318 |
25 | EE | Cristian Estan, Stefan Savage, George Varghese: Automatically inferring patterns of resource consumption in network traffic. SIGCOMM 2003: 137-148 |
24 | EE | Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker: Characterizing and measuring path diversity of internet topologies. SIGMETRICS 2003: 304-305 |
23 | EE | David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver: Inside the Slammer Worm. IEEE Security & Privacy 1(4): 33-39 (2003) |
2002 | ||
22 | EE | Cristian Estan, Stefan Savage, George Varghese: Automated measurement of high volume traffic clusters. Internet Measurement Workshop 2002: 177-178 |
21 | EE | John Bellardo, Stefan Savage: Measuring packet reordering. Internet Measurement Workshop 2002: 97-105 |
20 | EE | Eric J. Anderson, Thomas E. Anderson, Steven D. Gribble, Anna R. Karlin, Stefan Savage: A quantitative evaluation of traffic-aware routing strategies. Computer Communication Review 32(1): 67 (2002) |
2001 | ||
19 | EE | David Ely, Neil Spring, David Wetherall, Stefan Savage, Thomas E. Anderson: Robust Congestion Signaling. ICNP 2001: 332-341 |
18 | EE | David Ely, Stefan Savage, David Wetherall: Alpine: A User-Level Infrastructure for Network Protocol Development. USITS 2001 |
17 | EE | Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson: Network support for IP traceback. IEEE/ACM Trans. Netw. 9(3): 226-237 (2001) |
2000 | ||
16 | EE | Amit Aggarwal, Stefan Savage, Thomas E. Anderson: Understanding the Performance of TCP Pacing. INFOCOM 2000: 1157-1165 |
15 | EE | Neal Cardwell, Stefan Savage, Thomas E. Anderson: Modeling TCP Latency. INFOCOM 2000: 1742-1751 |
14 | EE | Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson: Practical network support for IP traceback. SIGCOMM 2000: 295-306 |
1999 | ||
13 | EE | Stefan Savage, Andy Collins, Eric Hoffman, John Snell, Thomas E. Anderson: The End-to-End Effects of Internet Path Selection. SIGCOMM 1999: 289-299 |
12 | EE | Stefan Savage: Sting: A TCP-based Network Measurement Tool. USENIX Symposium on Internet Technologies and Systems 1999 |
11 | EE | Stefan Savage, Neal Cardwell, Thomas E. Anderson: The Case for Informed Transport Protocols. Workshop on Hot Topics in Operating Systems 1999: 58-63 |
1997 | ||
10 | Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson: Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. SOSP 1997: 27-37 | |
9 | EE | Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson: Eraser: A Dynamic Data Race Detector for Multithreaded Programs. ACM Trans. Comput. Syst. 15(4): 391-411 (1997) |
1996 | ||
8 | Stefan Savage, John Wilkes: AFRAID - A Frequently Redundant Array of Independent Disks. USENIX Annual Technical Conference 1996: 27-39 | |
1995 | ||
7 | Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gün Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, Susan J. Eggers: Extensibility, Safety and Performance in the SPIN Operating System. SOSP 1995: 267-284 | |
6 | Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer: SPIN - An Extensible Microkernel for Application-specific Operating System Services. Operating Systems Review 29(1): 74-77 (1995) | |
1994 | ||
5 | Brian N. Bershad, Craig Chambers, Susan J. Eggers, Chris Maeda, Dylan McNamee, Przemyslaw Pardyak, Stefan Savage, Emin Gün Sirer: SPIN - An Extensible Microkernel for Application-specific Operating System Services. ACM SIGOPS European Workshop 1994: 68-71 | |
4 | Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda: Processor Capacity Reserves: Operating System Support for Multimedia Applications. ICMCS 1994: 90-99 | |
3 | Stefan Savage, Brian N. Bershad: Some Issues in the Design of an Extensible Operating System (Panel Statement). OSDI 1994: 196 | |
1993 | ||
2 | Stefan Savage, Hideyuki Tokuda: Real Time - Mach Timers: Exporting Time to the User. USENIX MACH Symposium 1993: 111-118 | |
1 | Clifford W. Mercer, Stefan Savage, Hideyuki Tokuda: Processor Capacity Reserves: An Abstraction for Managing Processor Usage. Workshop on Workstation Operating Systems 1993: 129-134 |