Stefan Savage
#36,207
Most Influential Person Now
American computer security expert
Stefan Savage's AcademicInfluence.com Rankings
Stefan Savagecriminal-justice Degrees
Criminal Justice
#155
World Rank
#178
Historical Rank
Cyber Security
#18
World Rank
#20
Historical Rank
Stefan Savagecomputer-science Degrees
Computer Science
#2006
World Rank
#2085
Historical Rank
Cybersecurity
#18
World Rank
#20
Historical Rank
Database
#3764
World Rank
#3918
Historical Rank
Download Badge
Criminal Justice Computer Science
Stefan Savage's Degrees
- PhD Computer Science University of Washington
- Masters Computer Science University of Washington
- Bachelors Computer Science University of Washington
Similar Degrees You Can Earn
Why Is Stefan Savage Influential?
(Suggest an Edit or Addition)According to Wikipedia, Stefan Savage is an American computer science researcher, currently a Professor in the Systems and Networking Group at the University of California, San Diego. There, he holds the Irwin and Joan Jacobs Chair in Information and Computer Science. Savage is widely cited in computer security, particularly in the areas of email spam, network worms and malware propagation, distributed denial of service mitigation and traceback, automotive hacking and wireless security. He received his undergraduate degree at Carnegie Mellon and his Ph.D. from the University of Washington .
Stefan Savage's Published Works
Published Works
- Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds (2009) (2256)
- Eraser: a dynamic data race detector for multithreaded programs (1997) (1607)
- Inferring Internet denial-of-service activity (2001) (1511)
- Comprehensive Experimental Analyses of Automotive Attack Surfaces (2011) (1450)
- Practical network support for IP traceback (2000) (1419)
- Extensibility safety and performance in the SPIN operating system (1995) (1191)
- Inside the Slammer Worm (2003) (1067)
- Beyond blacklists: learning to detect malicious web sites from suspicious URLs (2009) (835)
- 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions (2003) (832)
- Network support for IP traceback (2001) (753)
- Automated Worm Fingerprinting (2004) (608)
- Internet quarantine: requirements for containing self-propagating code (2003) (605)
- The end-to-end effects of Internet path selection (1999) (581)
- Total Recall: System Support for Automated Availability Management (2004) (577)
- SyncScan: practical fast handoff for 802.11 infrastructure networks (2005) (568)
- Identifying suspicious URLs: an application of large-scale online learning (2009) (566)
- Modeling TCP latency (2000) (550)
- Understanding Availability (2003) (540)
- Measuring the Cost of Cybercrime (2012) (534)
- Return-Oriented Programming: Systems, Languages, and Applications (2012) (497)
- Processor capacity reserves: operating system support for multimedia applications (1994) (468)
- An inquiry into the nature and causes of the wealth of internet miscreants (2007) (441)
- When good instructions go bad: generalizing return-oriented programming to RISC (2008) (413)
- Scalability, fidelity, and containment in the potemkin virtual honeyfarm (2005) (392)
- Understanding the performance of TCP pacing (2000) (369)
- Jigsaw: solving the puzzle of enterprise 802.11 analysis (2006) (366)
- Experimental Security Analysis of a Modern Automobile (2010) (362)
- Automatically inferring patterns of resource consumption in network traffic (2003) (328)
- The Spread of the Sapphire/Slammer Worm (2003) (327)
- A fistful of bitcoins: characterizing payments among men with no names (2013) (305)
- Spamalytics: an empirical analysis of spam marketing conversion (2009) (299)
- An analysis of underground forums (2011) (299)
- TCP congestion control with a misbehaving receiver (1999) (289)
- Click Trajectories: End-to-End Analysis of the Spam Value Chain (2011) (287)
- Detour: informed Internet routing and transport (1999) (248)
- Manufacturing compromise: the emergence of exploit-as-a-service (2012) (247)
- Difference engine (2010) (236)
- Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context (2010) (234)
- Improving Software Diagnosability via Log Enhancement (2011) (232)
- Sting: A TCP-based Network Measurement Tool (1999) (219)
- Unexpected means of protocol inference (2006) (219)
- Eraser: a dynamic data race detector for multi-threaded programs (1997) (216)
- Beyond heuristics: learning to classify vulnerabilities and predict exploits (2010) (215)
- Processor Capacity Reserves for Multimedia Operating Systems (1993) (214)
- Spamscatter: Characterizing Internet Scam Hosting Infrastructure (2007) (203)
- Cumulus: Filesystem backup to the cloud (2009) (198)
- California fault lines: understanding the causes and impact of network failures (2010) (196)
- Difference engine: harnessing memory redundancy in virtual machines (2008) (189)
- Spamalytics: an empirical analysis of spam marketing conversion (2008) (188)
- In search of path diversity in ISP networks (2003) (183)
- Detour: a Case for Informed Internet Routing and Transport (2007) (179)
- Network Telescopes: Technical Report (2004) (175)
- SPIN: an extensible microkernel for application-specific operating system services (1994) (163)
- SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments (2010) (162)
- Be Conservative: Enhancing Failure Diagnosis with Proactive Logging (2012) (158)
- When private keys are public: results from the 2008 Debian OpenSSL vulnerability (2009) (155)
- Replication Strategies for Highly Available Peer-to-Peer Storage (2002) (148)
- Fast and Vulnerable: A Story of Telematic Failures (2015) (145)
- The EarlyBird System for Real-time Detection of Unknown Worms (2005) (142)
- BlueSky: a cloud-backed file system for the enterprise (2012) (141)
- PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs (2012) (136)
- Automating cross-layer diagnosis of enterprise wireless networks (2007) (133)
- Show Me the Money: Characterizing Spam-advertised Revenue (2011) (128)
- Structured superpeers: leveraging heterogeneity to provide constant-time lookup (2003) (122)
- Spamcraft: An Inside Look At Spam Campaign Orchestration (2009) (114)
- Dirty Jobs: The Role of Freelance Labor in Web Service Abuse (2011) (112)
- Measuring packet reordering (2002) (109)
- Characterizing and measuring path diversity of internet topologies (2003) (109)
- On the Spam Campaign Trail (2008) (105)
- Framing Dependencies Introduced by Underground Commoditization (2015) (105)
- Scheduling techniques for hybrid circuit/packet networks (2015) (102)
- Cloak and dagger: dynamics of web search cloaking (2011) (101)
- AFRAID - A Frequently Redundant Array of Independent Disks (1996) (98)
- You've Got Vulnerability: Exploring Effective Vulnerability Notifications (2016) (94)
- Detecting and Isolating Malicious Routers (2006) (93)
- Alpine: A User-Level Infrastructure for Network Protocol Development (2001) (92)
- SPIN—an extensible microkernel for application-specific operating system services (1995) (91)
- Botnet Judo: Fighting Spam with Itself (2010) (89)
- Fatih: detecting and isolating malicious routers (2005) (85)
- A fistful of Bitcoins (2016) (85)
- Botcoin: Monetizing Stolen Cycles (2014) (82)
- DefenestraTor: Throwing Out Windows in Tor (2011) (81)
- Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks (2011) (81)
- Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild (2014) (80)
- Measuring the Practical Impact of DNSSEC Deployment (2013) (78)
- The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff (2008) (78)
- Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying (2004) (74)
- Security by Any Other Name: On the Effectiveness of Provider Based Email Security (2015) (68)
- Processor capacity reserves: an abstraction for managing processor usage (1993) (68)
- Characterizing Large-Scale Click Fraud in ZeroAccess (2014) (66)
- Self-stopping worms (2005) (65)
- Priceless: the role of payments in abuse-advertised goods (2012) (62)
- Opportunistic Measurement: Extracting Insight from Spurious Traffic (2005) (60)
- Detecting and Characterizing Lateral Phishing at Scale (2019) (59)
- Herd : A Scalable , Traffic Analysis Resistant Anonymity Network for VoIP Systems (2015) (58)
- On the empirical performance of self-calibrating WiFi location systems (2011) (58)
- Reading the Tea leaves: A Comparative Analysis of Threat Intelligence (2019) (57)
- Robust congestion signaling (2001) (52)
- Taster's choice: a comparative analysis of spam feeds (2012) (48)
- Who is .com?: Learning to Parse WHOIS Records (2015) (47)
- Measuring Online Service Availability Using Twitter (2010) (47)
- Neon: system support for derived data management (2010) (45)
- Xl: an efficient network routing algorithm (2008) (44)
- Modeling the Performance of Short TCP Connections (1998) (43)
- Detecting Malicious Packet Losses (2009) (43)
- Finding diversity in remote code injection exploits (2006) (41)
- From .academy to .zone: An Analysis of the New TLD Land Rush (2015) (40)
- Protection is a software issue (1995) (39)
- Search + Seizure: The Effectiveness of Interventions on SEO Campaigns (2014) (38)
- The case for informed transport protocols (1999) (38)
- Juice: A Longitudinal Study of an SEO Botnet (2013) (37)
- How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles (2017) (36)
- Got traffic?: an evaluation of click traffic providers (2011) (36)
- Affiliate Crookies: Characterizing Affiliate Marketing Abuse (2015) (35)
- scc: cluster storage provisioning informed by application characteristics and SLAs (2012) (34)
- The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe (2003) (34)
- Privacy-preserving network forensics (2011) (33)
- Reconsidering physical key secrecy: teleduplication via optical decoding (2008) (33)
- Judging a site by its content: learning the textual, structural, and visual features of malicious web pages (2011) (32)
- Hack for Hire: Exploring the Emerging Market for Account Hijacking (2019) (31)
- Detecting compromised routers via packet forwarding behavior (2008) (29)
- Improving software diagnosability via log enhancement (2012) (29)
- Tripwire: inferring internet site compromise (2017) (28)
- Knock it off: profiling the online storefronts of counterfeit merchandise (2014) (25)
- Denial-of-Service Attacks : Real Vulnerabilities and Practical Solutions (2011) (24)
- On Failure in Managed Enterprise Networks (2012) (23)
- No Plan Survives Contact: Experience with Cybercrime Measurement (2011) (22)
- Writing an Operating System with Modula-3 (1995) (22)
- Jetset: Targeted Firmware Rehosting for Embedded Systems (2021) (21)
- XXXtortion?: inferring registration intent in the .XXX TLD (2014) (21)
- Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003 (2003) (18)
- Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser (2017) (17)
- Report on Dimacs * Workshop on Large-scale Internet Attacks (17)
- Maximizing data locality in distributed systems (2006) (17)
- Proceedings of the ACM SIGCOMM 2008 conference on Data communication (2008) (17)
- Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting (2014) (17)
- Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations (2020) (16)
- Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers (2020) (16)
- Measuring Security Practices and How They Impact Security (2019) (14)
- Real Time - Mach Timers: Exporting Time to the User (1993) (13)
- Доверя'й, но проверя'й: SFI safety for native-compiled Wasm (2021) (13)
- A comparison of syslog and IS-IS for network failure analysis (2013) (13)
- Some Issues in the Design of an Extensible Operating System (Panel Statement) (1994) (13)
- Issues in the Design of an Extensible Operating System (1994) (13)
- Storm: When Researchers Collide (2008) (13)
- Too LeJIT to Quit: Extending JIT Spraying to ARM (2015) (12)
- Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion (2018) (12)
- Slicing Spam with Occam's Razor (2007) (10)
- Language Support for Extensible Operating Systems (2007) (10)
- On The Security of Mobile Cockpit Information Systems (2014) (9)
- How to tell an airport from a home: techniques and applications (2010) (9)
- Detecting malicious routers (2007) (9)
- Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research (2017) (9)
- The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules (2013) (8)
- Characterization of Anycast Adoption in the DNS Authoritative Infrastructure (2021) (8)
- Opportunistic Measurement : Spurious Network Events as a Light in the Darkness (8)
- A quantitative evaluation of traffic-aware routing strategies (2002) (7)
- Security Is Not a Commodity: the Road Forward for Cybersecurity Research (7)
- Who's got your mail?: characterizing mail service provider usage (2021) (7)
- CoResident Evil: Covert Communication In The Cloud With Lambdas (2021) (6)
- Automated availability management in large-scale storage systems (2004) (6)
- Automated measurement of high volume traffic clusters (2002) (5)
- Following Their Footsteps: Characterizing Account Automation Abuse and Defenses (2018) (5)
- Bucking Free-Riders : Distributed Accounting and Settlement in Peer-to-Peer Networks (2003) (4)
- Protocol design in an uncooperative internet (2002) (4)
- Hopper: Modeling and Detecting Lateral Movement (2021) (4)
- HTTPS Adoption in the Longtail (2018) (4)
- A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations (2017) (4)
- Triton: A Software-Reconfigurable Federated Avionics Testbed (2019) (3)
- Collaborative Research: NeTS—FIND: Privacy-Preserving Attribution and Provenence (2010) (3)
- Home is where the hijacking is: understanding DNS interception by residential routers (2021) (3)
- The Shaman Automatic 802.11 Wireless Diagnosis System (2010) (3)
- Web Feature Deprecation: A Case Study for Chrome (2019) (3)
- Real-Time Mach 3.0 User Reference Manual (1994) (3)
- AD-A 2 6 6 639 ImItlllll ! / l / ii / l / / / l / D T IC SELECTE JUL 6 1993 uC Processor Capacity Reserves for Multimedia Operating Systems (3)
- Study on Congestion Avoidance in MANET (2011) (2)
- Clairvoyance: Inferring Blocklist Use on the Internet (2021) (2)
- Proposal TWC : Frontier : Collaborative : Beyond Technical Security : Developing an Empirical Basis for Socio-Economic Perspectives (2012) (2)
- Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild (2022) (2)
- NeTS—FIND: Enabling Defense and Deterrence through Private Attribution (2006) (2)
- Where .ru?: assessing the impact of conflict on russian domain infrastructure (2022) (2)
- Proposal Center for Internet Epidemiology and Defenses (2004) (2)
- Browser Exploits as a Service: The Monetization of Driveby Downloads (2012) (2)
- Fault-Tolerant Forwarding in the Face of Malicious Routers (2004) (2)
- When Good Services Go Wild: Reassembling Web Services for Unintended Purposes (2012) (2)
- Brief announcement: detecting malicious routers (2004) (2)
- Trufflehunter (2020) (2)
- Risky BIZness: risks derived from registrar name management (2021) (2)
- Cumulus: Filesystems backup to the cloud (2009) (2)
- Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008 (2008) (2)
- WaVe: a verifiably secure WebAssembly sandboxing runtime (2022) (1)
- Center for Internet Epidemiology and Defenses (2009) (1)
- Quantitative Network Security Analysis (1)
- In search of security (2003) (1)
- Modern Automotive Vulnerabilities: Causes, Disclosures, and Outcomes (2016) (1)
- Measuring security practices (2022) (1)
- Hopper: Modeling and Detecting Lateral Movement (Extended Report) (2021) (1)
- Surveillance and privacy in the public and private sectors: panel (2019) (0)
- Domain Name Lifetimes: Baseline and Threats (2022) (0)
- Scalable internet threat monitoring (2005) (0)
- Measuring UID smuggling in the wild (2022) (0)
- Digital Defenses for Hacked Hearts: Why Software Patching Can Save Lives. (2018) (0)
- Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy (2023) (0)
- Secure and efficient wireless networks (2006) (0)
- Electrical Engineering (Communication Theory and Systems) (2006) (0)
- Protection is a Software (1999) (0)
- A Near-Optimal Algorithm for a Locality Maximising Placement Problem (2004) (0)
- Session details: Denial-of-service (2003) (0)
- Empirical Performance of Self-‐calibra2ng Wifi Loca2on Systems (0)
- No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps (2023) (0)
- Inside-out and backwards: a retrospective look at how measurement research really happens (2022) (0)
- Session details: Security (2009) (0)
- 4th Workshop on Cyber Security Experimentation and Test (cset '11) Opening Remarks Faster Secure Two-party Computation Using Garbled Circuits No Plan Survives Contact: Experience with Cybercrime Measurement Security Experimentation and the Real World Should Security Researchers Experiment More and D (0)
- Retroactive identification of targeted DNS infrastructure hijacking (2022) (0)
- USENIX Association Proceedings of the First Symposium on Networked Systems Design and Implementation (2004) (0)
- scc: Informed Provisioning of Storage for Cluster Applications (2012) (0)
- The Spread of the Sapphire / Slammer Worm By ( in alphabetical order ) (0)
- USENIX Association Proceedings of HotOS IX : The 9 th Workshop on Hot Topics in Operating Systems (2003) (0)
This paper list is powered by the following services:
Other Resources About Stefan Savage
What Schools Are Affiliated With Stefan Savage?
Stefan Savage is affiliated with the following schools: