Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds T Ristenpart, E Tromer, H Shacham, S Savage Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 3006 | 2009 |
Experimental security analysis of a modern automobile K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ... 2010 IEEE symposium on security and privacy, 447-462, 2010 | 2525 | 2010 |
Comprehensive experimental analyses of automotive attack surfaces S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ... 20th USENIX security symposium (USENIX Security 11), 2011 | 2246 | 2011 |
Inferring internet denial-of-service activity D Moore, C Shannon, DJ Brown, GM Voelker, S Savage ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006 | 2214 | 2006 |
Eraser: A dynamic data race detector for multithreaded programs S Savage, M Burrows, G Nelson, P Sobalvarro, T Anderson ACM Transactions on Computer Systems (TOCS) 15 (4), 391-411, 1997 | 2098 | 1997 |
Practical network support for IP traceback S Savage, D Wetherall, A Karlin, T Anderson Proceedings of the conference on Applications, Technologies, Architectures …, 2000 | 2032 | 2000 |
A fistful of bitcoins: characterizing payments among men with no names S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ... Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013 | 1858 | 2013 |
Inside the Slammer Worm D Moore, V Paxson, S Savage, C Shannon, S Staniford IEEE Magazine of Security and Privacy, 33-39, 2003 | 1779* | 2003 |
Extensibility safety and performance in the SPIN operating system BN Bershad, S Savage, P Pardyak, EG Sirer, ME Fiuczynski, D Becker, ... Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995 | 1580 | 1995 |
Beyond blacklists: learning to detect malicious web sites from suspicious URLs J Ma, LK Saul, S Savage, GM Voelker Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 1157 | 2009 |
Automated Worm Fingerprinting. S Singh, C Estan, G Varghese, S Savage OSDI 4, 4-4, 2004 | 1141 | 2004 |
802.11 {Denial-of-Service} attacks: Real vulnerabilities and practical solutions J Bellardo, S Savage 12th USENIX security symposium (USENIX Security 03), 2003 | 1089 | 2003 |
Internet quarantine: Requirements for containing self-propagating code D Moore, C Shannon, GM Voelker, S Savage IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 1088 | 2003 |
Network support for IP traceback S Savage, D Wetherall, A Karlin, T Anderson IEEE/ACM transactions on networking 9 (3), 226-237, 2001 | 909 | 2001 |
Measuring the cost of cybercrime R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ... The economics of information security and privacy, 265-300, 2013 | 815 | 2013 |
Understanding availability R Bhagwan, S Savage, GM Voelker Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeley …, 2003 | 795 | 2003 |
Identifying suspicious URLs: an application of large-scale online learning J Ma, LK Saul, S Savage, GM Voelker Proceedings of the 26th annual international conference on machine learning …, 2009 | 786 | 2009 |
Return-oriented programming: Systems, languages, and applications R Roemer, E Buchanan, H Shacham, S Savage ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-34, 2012 | 771 | 2012 |
Modeling TCP latency N Cardwell, S Savage, T Anderson Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000 | 767 | 2000 |
SyncScan: practical fast handoff for 802.11 infrastructure networks I Ramani, S Savage Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 765 | 2005 |