The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Samuel T. King: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen
    Enriching Intrusion Alerts Through Multi-Host Causality. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  2. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
    Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  3. George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen
    ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. [Citation Graph (0, 0)][DBLP]
    OSDI, 2002, pp:- [Conf]
  4. Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen
    Detecting past and present intrusions through vulnerability-specific predicates. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:91-104 [Conf]
  5. Samuel T. King, Peter M. Chen
    Backtracking intrusions. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:223-236 [Conf]
  6. Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch
    SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:314-327 [Conf]
  7. Samuel T. King, George W. Dunlap, Peter M. Chen
    Operating System Support for Virtual Machines. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2003, pp:71-84 [Conf]
  8. Samuel T. King, George W. Dunlap, Peter M. Chen
    Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!). [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:1-15 [Conf]
  9. Samuel T. King, Peter M. Chen
    Backtracking intrusions. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2005, v:23, n:1, pp:51-76 [Journal]

  10. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. [Citation Graph (, )][DBLP]


  11. Recovery domains: an organizing principle for recoverable operating systems. [Citation Graph (, )][DBLP]


  12. Capo: a software-hardware interface for practical deterministic multiprocessor replay. [Citation Graph (, )][DBLP]


  13. Designing and Implementing Malicious Hardware. [Citation Graph (, )][DBLP]


  14. Digging for Data Structures. [Citation Graph (, )][DBLP]


  15. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. [Citation Graph (, )][DBLP]


  16. Secure Web Browsing with the OP Web Browser. [Citation Graph (, )][DBLP]


  17. Alhambra: a system for creating, enforcing, and testing browser security policies. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002