|
Search the dblp DataBase
Samuel T. King:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen
Enriching Intrusion Alerts Through Multi-Host Causality. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. [Citation Graph (0, 0)][DBLP] OSDI, 2002, pp:- [Conf]
- Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen
Detecting past and present intrusions through vulnerability-specific predicates. [Citation Graph (0, 0)][DBLP] SOSP, 2005, pp:91-104 [Conf]
- Samuel T. King, Peter M. Chen
Backtracking intrusions. [Citation Graph (0, 0)][DBLP] SOSP, 2003, pp:223-236 [Conf]
- Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch
SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:314-327 [Conf]
- Samuel T. King, George W. Dunlap, Peter M. Chen
Operating System Support for Virtual Machines. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2003, pp:71-84 [Conf]
- Samuel T. King, George W. Dunlap, Peter M. Chen
Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!). [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2005, pp:1-15 [Conf]
- Samuel T. King, Peter M. Chen
Backtracking intrusions. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2005, v:23, n:1, pp:51-76 [Journal]
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. [Citation Graph (, )][DBLP]
Recovery domains: an organizing principle for recoverable operating systems. [Citation Graph (, )][DBLP]
Capo: a software-hardware interface for practical deterministic multiprocessor replay. [Citation Graph (, )][DBLP]
Designing and Implementing Malicious Hardware. [Citation Graph (, )][DBLP]
Digging for Data Structures. [Citation Graph (, )][DBLP]
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. [Citation Graph (, )][DBLP]
Secure Web Browsing with the OP Web Browser. [Citation Graph (, )][DBLP]
Alhambra: a system for creating, enforcing, and testing browser security policies. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|