• Publications
  • Influence
Eraser: A Dynamic Data Race Detector for Multithreaded Programs
Multithreaded programming is difficult and error prone. It is easy to make a mistake in synchronization that produces a data race, yet it can be extremely hard to locate this mistake duringExpand
  • 1,475
  • 146
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft's Azure and Amazon's EC2, allow users to instantiate virtual machines (VMs) onExpand
  • 1,981
  • 122
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and sophistication ofExpand
  • 1,048
  • 113
Extensibility safety and performance in the SPIN operating system
Particulate material is dispensed from a portable supply container by application of positive pressure in the open space of the container above the material to fluidize the same, and simultaneously,Expand
  • 890
  • 113
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors. However, this use is predicated on an implicit assumptionExpand
  • 767
  • 103
Comprehensive Experimental Analyses of Automotive Attack Surfaces
Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has shown that the internal networks within some modern cars areExpand
  • 1,071
  • 82
Network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This work is motivated by the increased frequency and sophistication ofExpand
  • 723
  • 80
Inside the Slammer Worm
The Slammer worm spread so quickly that human response was ineffective. In January 2003, it packed a benign payload, but its disruptive capacity was surprising. Why was it so effective and what newExpand
  • 1,025
  • 78
Total Recall: System Support for Automated Availability Management
Availability is a storage system property that is both highly desired and yet minimally engineered. While many systems provide mechanisms to improve availability - such as redundancy and failureExpand
  • 551
  • 72
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
Malicious Web sites are a cornerstone of Internet criminal activities. As a result, there has been broad interest in developing systems to prevent the end user from visiting such sites. In thisExpand
  • 660
  • 70