Stefan Savage
University of California, San Diego
H-index: 87
North America-United States
Top articles of Stefan Savage
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
An Empirical Analysis on the Use and Reporting of National Security Letters | arXiv preprint arXiv:2403.02768 | Alex Bellon Miro Haller Andrey Labunets Enze Liu Stefan Savage | 2024/3/5 |
WaVe: a verifiably secure WebAssembly sandboxing runtime | Evan Johnson Evan Laufer Zijie Zhao Dan Gohman Shravan Narayan | 2023/5/21 | |
Understanding the viability of gmail's origin indicator for identifying the sender | Enze Liu Lu Sun Alex Bellon Grant Ho Geoffrey M Voelker | 2023 | |
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates | Mirian Ariana Ho Grant Savage Stefan Voelker Geoffrey M | 2023/12/4 | |
No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps | Proceedings on Privacy Enhancing Technologies | Enze Liu Sumanth Rao Sam Havron Grant Ho Stefan Savage | 2023 |
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild | Katherine Izhikevich Geoffrey M Voelker Stefan Savage Liz Izhikevich | 2023/11/23 | |
In the Line of Fire: Risks of DPI-triggered Data Collection | Ariana Mirian Alisha Ukani Ian Foster Gautam Akiwate Taner Halicioglu | 2023/8/7 | |
Forward pass: On the security implications of email forwarding mechanism and policy | arXiv preprint arXiv:2302.07287 | Enze Liu Gautam Akiwate Mattijs Jonker Ariana Mirian Grant Ho | 2023/2/14 |
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild | arXiv preprint arXiv:2203.10188 | Audrey Randall Peter Snyder Alisha Ukani Alex Snoeren Geoff Voelker | 2022/3/18 |
Where. ru? Assessing the impact of conflict on Russian domain infrastructure | Mattijs Jonker Gautam Akiwate Antonia Affinito kc Claffy Alessio Botta | 2022/10/25 | |
Measuring UID smuggling in the wild | Audrey Randall Peter Snyder Alisha Ukani Alex C Snoeren Geoffrey M Voelker | 2022/10/25 | |
Retroactive identification of targeted DNS infrastructure hijacking | Gautam Akiwate Raffaele Sommese Mattijs Jonker Zakir Durumeric KC Claffy | 2022 | |
Measuring security practices | Communications of the ACM | Louis F DeKoven Audrey Randall Ariana Mirian Gautam Akiwate Ansel Blume | 2022/8/19 |
The Challenges of Blockchain-Based Naming Systems for Malware Defenders | Audrey Randall Wes Hardaker Geoffrey M Voelker Stefan Savage Aaron Schulman | 2022/11/30 | |
Domain Name Lifetimes: Baseline and Threats. | Antonia Affinito Raffaele Sommese Gautam Akiwate Stefan Savage KC Claffy | 2022/6/27 | |
Inside-out and backwards: a retrospective look at how measurement research really happens | Stefan Savage | 2022/10/25 | |
Доверяй, но проверяй: SFI safety for native-compiled Wasm | Network and Distributed Systems Security (NDSS) Symposium | Evan Johnson David Thien Yousef Alhessi Shravan Narayan Fraser Brown | 2021/2 |
Hopper: Modeling and detecting lateral movement | Grant Ho Mayank Dhiman Devdatta Akhawe Vern Paxson Stefan Savage | 2021 | |
Home is where the hijacking is: understanding DNS interception by residential routers | Audrey Randall Enze Liu Ramakrishna Padmanabhan Gautam Akiwate Geoffrey M Voelker | 2021/11/2 | |
Jetset: Targeted firmware rehosting for embedded systems | Evan Johnson Maxwell Bland YiFei Zhu Joshua Mason Stephen Checkoway | 2021 |