Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds T Ristenpart, E Tromer, H Shacham, S Savage Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 2883 | 2009 |
Experimental security analysis of a modern automobile K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ... 2010 IEEE symposium on security and privacy, 447-462, 2010 | 2270 | 2010 |
Inferring internet denial-of-service activity D Moore, C Shannon, DJ Brown, GM Voelker, S Savage ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006 | 2174 | 2006 |
Eraser: A dynamic data race detector for multithreaded programs S Savage, M Burrows, G Nelson, P Sobalvarro, T Anderson ACM Transactions on Computer Systems (TOCS) 15 (4), 391-411, 1997 | 2044 | 1997 |
Practical network support for IP traceback S Savage, D Wetherall, A Karlin, T Anderson Proceedings of the conference on Applications, Technologies, Architectures …, 2000 | 2016 | 2000 |
Comprehensive experimental analyses of automotive attack surfaces. S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ... USENIX security symposium 4 (447-462), 2021, 2011 | 2006 | 2011 |
Inside the Slammer Worm D Moore, V Paxson, S Savage, C Shannon, S Staniford IEEE Magazine of Security and Privacy, 33-39, 2003 | 1735* | 2003 |
A fistful of bitcoins: characterizing payments among men with no names S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ... Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013 | 1617 | 2013 |
Extensibility safety and performance in the SPIN operating system BN Bershad, S Savage, P Pardyak, EG Sirer, ME Fiuczynski, D Becker, ... Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995 | 1565 | 1995 |
Beyond blacklists: learning to detect malicious web sites from suspicious URLs J Ma, LK Saul, S Savage, GM Voelker Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 1101 | 2009 |
Automated Worm Fingerprinting. S Singh, C Estan, G Varghese, S Savage OSDI 4, 4-4, 2004 | 1100 | 2004 |
Internet quarantine: Requirements for containing self-propagating code D Moore, C Shannon, GM Voelker, S Savage IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 1066 | 2003 |
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. J Bellardo, S Savage USENIX security symposium 12, 2-2, 2003 | 1049 | 2003 |
Network support for IP traceback S Savage, D Wetherall, A Karlin, T Anderson IEEE/ACM transactions on networking 9 (3), 226-237, 2001 | 894 | 2001 |
Understanding availability R Bhagwan, S Savage, GM Voelker Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeley …, 2003 | 789 | 2003 |
Modeling TCP latency N Cardwell, S Savage, T Anderson Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000 | 748 | 2000 |
Measuring the cost of cybercrime R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ... The economics of information security and privacy, 265-300, 2013 | 745 | 2013 |
SyncScan: practical fast handoff for 802.11 infrastructure networks I Ramani, S Savage Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 743 | 2005 |
The end-to-end effects of Internet path selection S Savage, A Collins, E Hoffman, J Snell, T Anderson Proceedings of the conference on Applications, technologies, architectures …, 1999 | 740 | 1999 |
Total Recall: System Support for Automated Availability Management. R Bhagwan, K Tati, Y Cheng, S Savage, GM Voelker Nsdi 4, 25-25, 2004 | 736 | 2004 |