What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stefan Savage
Google Scholar
51
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Understanding the Efficacy of Phishing Training in Practice.
Grant Ho
Ariana Mirian
Elisa Luo
Khang Tong
Euyhyun Lee
Lin Liu
Christopher A. Longhurst
Christian Dameff
Stefan Savage
Geoffrey M. Voelker
2024
conf/eurosp
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild.
Katherine Izhikevich
Geoffrey M. Voelker
Stefan Savage
Liz Izhikevich
2023
journals/popets
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps.
Enze Liu
Sumanth Rao
Sam Havron
Grant Ho
Stefan Savage
Geoffrey M. Voelker
Damon McCoy
2023
conf/uss
In the Line of Fire: Risks of DPI-triggered Data Collection.
Ariana Mirian
Alisha Ukani
Ian D. Foster
Gautam Akiwate
Taner Halicioglu
Cynthia T. Moore
Alex C. Snoeren
Geoffrey M. Voelker
Stefan Savage
2023
conf/sp
WaVe: a verifiably secure WebAssembly sandboxing runtime.
Evan Johnson
Evan Laufer
Zijie Zhao
Dan Gohman
Shravan Narayan
Stefan Savage
Deian Stefan
Fraser Brown
2023
conf/soups
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.
Enze Liu
Lu Sun
Alex Bellon
Grant Ho
Geoffrey M. Voelker
Stefan Savage
Imani N. S. Munyaka
2023
conf/eurosp
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy.
Enze Liu
Gautam Akiwate
Mattijs Jonker
Ariana Mirian
Grant Ho
Geoffrey M. Voelker
Stefan Savage
2023
conf/acsac
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates.
Ariana Mirian
Grant Ho
Stefan Savage
Geoffrey M. Voelker
2021
conf/uss
Hopper: Modeling and Detecting Lateral Movement.
Grant Ho
Mayank Dhiman
Devdatta Akhawe
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2021
conf/uss
Jetset: Targeted Firmware Rehosting for Embedded Systems.
Evan Johnson
Maxwell Bland
Yifei Zhu
Joshua Mason
Stephen Checkoway
Stefan Savage
Kirill Levchenko
2021
conf/ndss
Доверя'й, но проверя'й: SFI safety for native-compiled Wasm.
Evan Johnson
David Thien
Yousef Alhessi
Shravan Narayan
Fraser Brown
Sorin Lerner
Tyler McMullen
Stefan Savage
Deian Stefan
2019
conf/uss
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence.
Vector Guo Li
Matthew Dunn
Paul Pearce
Damon McCoy
Geoffrey M. Voelker
Stefan Savage
2019
conf/uss
Detecting and Characterizing Lateral Phishing at Scale.
Grant Ho
Asaf Cidon
Lior Gavish
Marco Schweighauser
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2019
conf/uss
Triton: A Software-Reconfigurable Federated Avionics Testbed.
Sam Crow
Brown Farinholt
Brian Johannesmeyer
Karl Koscher
Stephen Checkoway
Stefan Savage
Aaron Schulman
Alex C. Snoeren
Kirill Levchenko
2018
conf/ccs
Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion.
Stefan Savage
2017
conf/ccs
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research.
Alexander Gamero-Garrido
Stefan Savage
Kirill Levchenko
Alex C. Snoeren
2017
conf/uss
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser.
Louis F. DeKoven
Stefan Savage
Geoffrey M. Voelker
Nektarios Leontiadis
2017
conf/sp
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles.
Moritz Contag
Vector Guo Li
Andre Pawlowski
Felix Domke
Kirill Levchenko
Thorsten Holz
Stefan Savage
2017
conf/ndss
A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations.
Wilson Lian
Hovav Shacham
Stefan Savage
2016
conf/uss
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Frank Li
Zakir Durumeric
Jakub Czyz
Mohammad Karami
Michael D. Bailey
Damon McCoy
Stefan Savage
Vern Paxson
2015
conf/ccs
Security by Any Other Name: On the Effectiveness of Provider Based Email Security.
Ian D. Foster
Jon Larson
Max Masich
Alex C. Snoeren
Stefan Savage
Kirill Levchenko
2015
conf/ndss
Too LeJIT to Quit: Extending JIT Spraying to ARM.
Wilson Lian
Hovav Shacham
Stefan Savage
2014
conf/ccs
Characterizing Large-Scale Click Fraud in ZeroAccess.
Paul Pearce
Vacha Dave
Chris Grier
Kirill Levchenko
Saikat Guha
Damon McCoy
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2014
conf/ccs
On The Security of Mobile Cockpit Information Systems.
Devin Lundberg
Brown Farinholt
Edward Sullivan
Ryan A. Mast
Stephen Checkoway
Stefan Savage
Alex C. Snoeren
Kirill Levchenko
2014
conf/ndss
Botcoin: Monetizing Stolen Cycles.
Danny Yuxing Huang
Hitesh Dharmdasani
Sarah Meiklejohn
Vacha Dave
Chris Grier
Damon McCoy
Stefan Savage
Nicholas Weaver
Alex C. Snoeren
Kirill Levchenko
2013
conf/uss
Measuring the Practical Impact of DNSSEC Deployment.
Wilson Lian
Eric Rescorla
Hovav Shacham
Stefan Savage
2013
conf/ndss
Juice: A Longitudinal Study of an SEO Botnet.
David Y. Wang
Stefan Savage
Geoffrey M. Voelker
2012
conf/ccs
Manufacturing compromise: the emergence of exploit-as-a-service.
Chris Grier
Lucas Ballard
Juan Caballero
Neha Chachra
Christian J. Dietrich
Kirill Levchenko
Panayiotis Mavrommatis
Damon McCoy
Antonio Nappa
Andreas Pitsillidis
Niels Provos
M. Zubair Rafique
Moheeb Abu Rajab
Christian Rossow
Kurt Thomas
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2012
conf/ccs
Priceless: the role of payments in abuse-advertised goods.
Damon McCoy
Hitesh Dharmdasani
Christian Kreibich
Geoffrey M. Voelker
Stefan Savage
2012
conf/uss
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Damon McCoy
Andreas Pitsillidis
Grant Jordan
Nicholas Weaver
Christian Kreibich
Brian Krebs
Geoffrey M. Voelker
Stefan Savage
Kirill Levchenko
2012
conf/uss
When Good Services Go Wild: Reassembling Web Services for Unintended Purposes.
Feng Lu
Jiaqi Zhang
Stefan Savage
2011
conf/ccs
Judging a site by its content: learning the textual, structural, and visual features of malicious web pages.
Sushma Nagesh Bannur
Lawrence K. Saul
Stefan Savage
2011
conf/ccs
Cloak and dagger: dynamics of web search cloaking.
David Y. Wang
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Show Me the Money: Characterizing Spam-advertised Revenue.
Chris Kanich
Nicholas Weaver
Damon McCoy
Tristan Halvorson
Christian Kreibich
Kirill Levchenko
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2011
conf/uss
No Plan Survives Contact: Experience with Cybercrime Measurement.
Chris Kanich
Neha Chachra
Damon McCoy
Chris Grier
David Y. Wang
Marti Motoyama
Kirill Levchenko
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.
Marti Motoyama
Damon McCoy
Kirill Levchenko
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks.
Keaton Mowery
Sarah Meiklejohn
Stefan Savage
2011
conf/uss
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
Karl Koscher
Alexei Czeskis
Franziska Roesner
Tadayoshi Kohno
2011
conf/sp
Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Kirill Levchenko
Andreas Pitsillidis
Neha Chachra
Brandon Enright
Márk Félegyházi
Chris Grier
Tristan Halvorson
Chris Kanich
Christian Kreibich
He Liu
Damon McCoy
Nicholas Weaver
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2010
conf/uss
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Marti Motoyama
Kirill Levchenko
Chris Kanich
Damon McCoy
Geoffrey M. Voelker
Stefan Savage
2010
conf/sp
Experimental Security Analysis of a Modern Automobile.
Karl Koscher
Alexei Czeskis
Franziska Roesner
Shwetak N. Patel
Tadayoshi Kohno
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
2010
conf/ndss
Botnet Judo: Fighting Spam with Itself.
Andreas Pitsillidis
Kirill Levchenko
Christian Kreibich
Chris Kanich
Geoffrey M. Voelker
Vern Paxson
Nicholas Weaver
Stefan Savage
2009
conf/ccs
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Thomas Ristenpart
Eran Tromer
Hovav Shacham
Stefan Savage
2008
conf/ccs
Reconsidering physical key secrecy: teleduplication via optical decoding.
Benjamin Laxton
Kai Wang
Stefan Savage
2008
conf/ccs
When good instructions go bad: generalizing return-oriented programming to RISC.
Erik Buchanan
Ryan Roemer
Hovav Shacham
Stefan Savage
2008
conf/ccs
Spamalytics: an empirical analysis of spam marketing conversion.
Chris Kanich
Christian Kreibich
Kirill Levchenko
Brandon Enright
Geoffrey M. Voelker
Vern Paxson
Stefan Savage
2007
conf/ccs
An inquiry into the nature and causes of the wealth of internet miscreants.
Jason Franklin
Adrian Perrig
Vern Paxson
Stefan Savage
2007
conf/uss
Spamscatter: Characterizing Internet Scam Hosting Infrastructure.
David S. Anderson
Chris Fleizach
Stefan Savage
Geoffrey M. Voelker
2005
conf/dsn
Fatih: Detecting and Isolating Malicious Routers.
Alper Tugay Mizrak
Yuchung Cheng
Keith Marzullo
Stefan Savage
2003
conf/uss
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
John Bellardo
Stefan Savage
2001
conf/uss
Inferring Internet Denial-of-Service Activity.
David Moore
Geoffrey M. Voelker
Stefan Savage
Coauthors
Aaron Schulman
(1)
Adrian Perrig
(1)
Alex Bellon
(1)
Alex C. Snoeren
(6)
Alexander Gamero-Garrido
(1)
Alexei Czeskis
(2)
Alisha Ukani
(1)
Alper Tugay Mizrak
(1)
Andre Pawlowski
(1)
Andreas Pitsillidis
(4)
Antonio Nappa
(1)
Ariana Mirian
(4)
Asaf Cidon
(1)
Benjamin Laxton
(1)
Brandon Enright
(2)
Brian Johannesmeyer
(1)
Brian Kantor
(2)
Brian Krebs
(1)
Brown Farinholt
(2)
Chris Fleizach
(1)
Chris Grier
(5)
Chris Kanich
(6)
Christian Dameff
(1)
Christian J. Dietrich
(1)
Christian Kreibich
(6)
Christian Rossow
(1)
Christopher A. Longhurst
(1)
Cynthia T. Moore
(1)
Damon McCoy
(15)
Dan Gohman
(1)
Danny Anderson
(2)
Danny Yuxing Huang
(1)
David A. Wagner
(2)
David Moore
(1)
David S. Anderson
(1)
David Thien
(1)
David Y. Wang
(3)
Deian Stefan
(2)
Devdatta Akhawe
(1)
Devin Lundberg
(1)
Edward Sullivan
(1)
Elisa Luo
(1)
Enze Liu
(3)
Eran Tromer
(1)
Eric Rescorla
(1)
Erik Buchanan
(1)
Euyhyun Lee
(1)
Evan Johnson
(3)
Evan Laufer
(1)
Felix Domke
(1)
Feng Lu
(1)
Frank Li
(1)
Franziska Roesner
(2)
Fraser Brown
(2)
Gautam Akiwate
(2)
Geoffrey M. Voelker
(26)
Grant Ho
(7)
Grant Jordan
(1)
He Liu
(1)
Hitesh Dharmdasani
(2)
Hovav Shacham
(7)
Ian D. Foster
(2)
Imani N. S. Munyaka
(1)
Jakub Czyz
(1)
Jason Franklin
(1)
Jiaqi Zhang
(1)
John Bellardo
(1)
Jon Larson
(1)
Joshua Mason
(1)
Juan Caballero
(1)
Kai Wang
(1)
Karl Koscher
(3)
Katherine Izhikevich
(1)
Keaton Mowery
(1)
Keith Marzullo
(1)
Khang Tong
(1)
Kirill Levchenko
(17)
Kurt Thomas
(1)
Lawrence K. Saul
(1)
Lin Liu
(1)
Lior Gavish
(1)
Liz Izhikevich
(1)
Louis F. DeKoven
(1)
Lu Sun
(1)
Lucas Ballard
(1)
M. Zubair Rafique
(1)
Marco Schweighauser
(1)
Márk Félegyházi
(1)
Marti Motoyama
(3)
Matthew Dunn
(1)
Mattijs Jonker
(1)
Max Masich
(1)
Maxwell Bland
(1)
Mayank Dhiman
(1)
Michael D. Bailey
(1)
Mohammad Karami
(1)
Moheeb Abu Rajab
(1)
Moritz Contag
(1)
Neha Chachra
(3)
Nektarios Leontiadis
(1)
Nicholas Weaver
(5)
Niels Provos
(1)
Panayiotis Mavrommatis
(1)
Paul Pearce
(2)
Ryan A. Mast
(1)
Ryan Roemer
(1)
Saikat Guha
(1)
Sam Crow
(1)
Sam Havron
(1)
Sarah Meiklejohn
(2)
Shravan Narayan
(2)
Shwetak N. Patel
(1)
Sorin Lerner
(1)
Stefan Savage
(51)
Stephen Checkoway
(5)
Sumanth Rao
(1)
Sushma Nagesh Bannur
(1)
Tadayoshi Kohno
(2)
Taner Halicioglu
(1)
Thomas Ristenpart
(1)
Thorsten Holz
(1)
Tristan Halvorson
(2)
Tyler McMullen
(1)
Vacha Dave
(2)
Vector Guo Li
(2)
Vern Paxson
(10)
Wilson Lian
(3)
Yifei Zhu
(1)
Yousef Alhessi
(1)
Yuchung Cheng
(1)
Zakir Durumeric
(1)
Zijie Zhao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to