dblp.uni-trier.dewww.uni-trier.de

Chad Verbowski

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
15EESamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch: SubVirt: Implementing malware with virtual machines. IEEE Symposium on Security and Privacy 2006: 314-327
14EEChad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang: LiveOps: Systems Management as a Service. LISA 2006: 187-203
13 Chad Verbowski: System Administration: Drowning in Management Complexity. LISA 2006
12EEYi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006
11EEChad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev: Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. OSDI 2006: 117-130
10EEChad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee: Analyzing persistent state interactions to improve state management. SIGMETRICS/Performance 2006: 363-364
2005
9EEYi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski: Detecting Stealth Software with Strider GhostBuster. DSN 2005: 368-377
8EEShuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang: A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. NDSS 2005
2004
7EEJohn Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang: Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. ICAC 2004: 106-113
6 Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang: Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. LISA 2004
5EEYi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo: Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. LISA 2004: 33-46
4EEYi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson: Summary-based routing for content-based event distribution networks. Computer Communication Review 34(5): 59-74 (2004)
3EEYi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: Strider: a black-box, state-based approach to change and configuration management and support. Sci. Comput. Program. 53(2): 143-164 (2004)
2003
2EEYi-Min Wang, Chad Verbowski, Daniel R. Simon: Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. DSN 2003: 311-316
1EEYi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. LISA 2003: 159-172

Coauthor Index

1Dimitris Achlioptas [4]
2Doug Beck [9] [12]
3Peter M. Chen [15]
4Shuo Chen [8] [12]
5Yu Chen [1] [3]
6Brad Daniels [6] [7] [10] [11]
7Gautam Das [4]
8John Dunagan [1] [3] [6] [7] [8]
9Yennun Huang [5]
10Xuxian Jiang [12]
11Aaron Johnson [5] [7]
12Emre Kiciman [10] [11]
13Samuel T. King [12] [15]
14Arunvijay Kumar [11]
15Sy-Yen Kuo [5]
16Per-Åke Larson (Paul Larson) [4]
17Juhan Lee [10] [11] [14]
18Xiaogang Liu [14]
19Jacob R. Lorch [15]
20Shan Lu [10] [11]
21Lili Qiu [4]
22Roussi Roussev [5] [7] [9] [10] [11] [12] [14]
23Daniel R. Simon [2]
24Binh Vo [9]
25Helen J. Wang [1] [3] [15]
26Yi-Min Wang [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [14] [15]
27Ming-Wei Wu [5]
28Chun Yuan [1] [3]
29Zheng Zhang [1] [3]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)