BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Canada
1 × United Kingdom
2 × France
7 × USA
Collaborated with:
G.M.Voelker L.K.Saul J.Ma G.Varghese D.Yuan S.Park Y.Zhou M.F.Der M.Bozorgi M.Vrable A.C.Snoeren S.Singh C.Estan J.Zheng M.Burrows G.Nelson P.Sobalvarro T.E.Anderson P.Huang Y.Liu M.M.Lee X.Tang D.Gupta S.Lee A.Vahdat J.Chen D.Moore E.Vandekieft B.N.Bershad P.Pardyak E.G.Sirer M.E.Fiuczynski D.Becker C.Chambers S.J.Eggers
Talks about:
learn (3) virtual (2) suspici (2) enhanc (2) beyond (2) onlin (2) url (2) log (2) fingerprint (1) counterfeit (1)

Person: Stefan Savage

DBLP DBLP: Savage:Stefan

Contributed to:

KDD 20142014
OSDI 20122012
ASPLOS 20112011
KDD 20102010
ICML 20092009
KDD 20092009
OSDI 20082008
SOSP 20052005
OSDI 20042004
SOSP 19971997
SOSP 19951995

Wrote 11 papers:

KDD-2014-DerSSV #online #profiling
Knock it off: profiling the online storefronts of counterfeit merchandise (MFD, LKS, SS, GMV), pp. 1759–1768.
OSDI-2012-YuanPHLLTZS
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging (DY, SP, PH, YL, MMJL, XT, YZ, SS), pp. 293–306.
ASPLOS-2011-YuanZPZS
Improving software diagnosability via log enhancement (DY, JZ, SP, YZ, SS), pp. 3–14.
KDD-2010-BozorgiSSV #heuristic #learning #predict
Beyond heuristics: learning to classify vulnerabilities and predict exploits (MB, LKS, SS, GMV), pp. 105–114.
ICML-2009-MaSSV #identification #learning #online #scalability
Identifying suspicious URLs: an application of large-scale online learning (JM, LKS, SS, GMV), pp. 681–688.
KDD-2009-MaSSV #detection #learning #web
Beyond blacklists: learning to detect malicious web sites from suspicious URLs (JM, LKS, SS, GMV), pp. 1245–1254.
OSDI-2008-GuptaLVSSVVV #difference #memory management #virtual machine
Difference Engine: Harnessing Memory Redundancy in Virtual Machines (DG, SL, MV, SS, ACS, GV, GMV, AV), pp. 309–322.
SOSP-2005-VrableMCMVSVS #scalability
Scalability, fidelity, and containment in the potemkin virtual honeyfarm (MV, JM, JC, DM, EV, ACS, GMV, SS), pp. 148–162.
OSDI-2004-SinghEVS #automation
Automated Worm Fingerprinting (SS, CE, GV, SS), pp. 45–60.
SOSP-1997-SavageABNS #concurrent #detection #multi #named #source code #thread
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs (SS, MB, GN, PS, TEA), pp. 27–37.
SOSP-1995-BershadSPSFBCE #operating system #performance #safety
Extensibility, Safety and Performance in the SPIN Operating System (BNB, SS, PP, EGS, MEF, DB, CC, SJE), pp. 267–284.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.