SubVirt: Implementing malware with virtual machines ST King, PM Chen 2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-327, 2006 | 707 | 2006 |
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities YM Wang 13th Annual Network and Distributed System Security Symposium (NDSS), 2006, 2006 | 611* | 2006 |
Cybersquatter patrol YM Wang, D Beck, C Verbowski, B Daniels, M Ma US Patent 7,756,987, 2010 | 342 | 2010 |
Detecting stealth software with strider ghostbuster YM Wang, D Beck, B Vo, R Roussev, C Verbowski 2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005 | 290 | 2005 |
State based configuration failure detection using checkpoint comparison C Verbowski, YM Wang US Patent App. 10/464,118, 2004 | 260 | 2004 |
Strider: A black-box, state-based approach to change and configuration management and support YM Wang, C Verbowski, J Dunagan, Y Chen, HJ Wang, C Yuan, Z Zhang Science of Computer Programming 53 (2), 143-164, 2004 | 252 | 2004 |
Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting. YM Wang, D Beck, J Wang, C Verbowski, B Daniels SRUTI 6 (31-36), 2-2, 2006 | 154 | 2006 |
Fingerprinting event logs for system management troubleshooting R Panigrahy, C Verbowski, Y Xie, J Yang, D Yuan US Patent 8,069,374, 2011 | 134 | 2011 |
Summary-based routing for content-based event distribution networks YM Wang, L Qiu, CE Verbowski, D Achlioptas, G Das, PA Larson US Patent 7,200,675, 2007 | 126 | 2007 |
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. YM Wang, R Roussev, C Verbowski, A Johnson, MW Wu, Y Huang, ... LISA 4, 33-46, 2004 | 114 | 2004 |
Changed file identification, software conflict resolution and unwanted file removal YM Wang, AR Johnson, DC Ladd, RA Roussev, CE Verbowski US Patent 7,765,592, 2010 | 104 | 2010 |
Context-based online configuration-error detection D Yuan, Y Xie, R Panigrahy, J Yang, C Verbowski, A Kumar Proceedings of the 2011 USENIX conference on USENIX annual technical …, 2011 | 100 | 2011 |
Flight data recorder: Monitoring persistent-state interactions to improve systems management C Verbowski, E Kiciman, A Kumar, B Daniels, S Lu, J Lee, YM Wang, ... Proceedings of the 7th symposium on Operating systems design and …, 2006 | 87 | 2006 |
Method and system for detecting infection of an operating system DR Beck, AR Johnson, RA Roussev, CE Verbowski, BD Vo, YM Wang US Patent 7,627,898, 2009 | 85 | 2009 |
Managing spyware and unwanted software through auto-start extensibility points YM Wang, C Verbowski, A Johnson, R Roussev US Patent App. 10/952,336, 2005 | 82 | 2005 |
Isolation environment-based information access JR Lorch, YM Wang, C Verbowski, HJ Wang, S King US Patent 8,024,815, 2011 | 76 | 2011 |
Method and system for analyzing the impact of a software update BR Daniels, J Dunagan, RA Roussev, CE Verbowski, YM Wang US Patent 7,614,046, 2009 | 72 | 2009 |
Thread interception and analysis C Verbowski, B Daniels, J Dunagan, S Lu, R Roussev, J Lee, A Kumar US Patent 7,716,530, 2010 | 64 | 2010 |
Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems CE Verbowski, JH Wang, JC Platt, R Zhang, Y Chen US Patent 7,584,382, 2009 | 60 | 2009 |
Towards a self-managing software patching process using black-box persistent-state manifests J Dunagan, R Roussev, B Daniels, A Johnson, C Verbowski, YM Wang International Conference on Autonomic Computing, 2004. Proceedings., 106-113, 2004 | 60 | 2004 |