| 2006 |
15 | | Samuel T. King,
Peter M. Chen,
Yi-Min Wang,
Chad Verbowski,
Helen J. Wang,
Jacob R. Lorch:
SubVirt: Implementing malware with virtual machines.
IEEE Symposium on Security and Privacy 2006: 314-327 |
14 | | Chad Verbowski,
Juhan Lee,
Xiaogang Liu,
Roussi Roussev,
Yi-Min Wang:
LiveOps: Systems Management as a Service.
LISA 2006: 187-203 |
13 | | Chad Verbowski:
System Administration: Drowning in Management Complexity.
LISA 2006 |
12 | | Yi-Min Wang,
Doug Beck,
Xuxian Jiang,
Roussi Roussev,
Chad Verbowski,
Shuo Chen,
Samuel T. King:
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
NDSS 2006 |
11 | | Chad Verbowski,
Emre Kiciman,
Arunvijay Kumar,
Brad Daniels,
Shan Lu,
Juhan Lee,
Yi-Min Wang,
Roussi Roussev:
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management.
OSDI 2006: 117-130 |
10 | | Chad Verbowski,
Emre Kiciman,
Brad Daniels,
Yi-Min Wang,
Roussi Roussev,
Shan Lu,
Juhan Lee:
Analyzing persistent state interactions to improve state management.
SIGMETRICS/Performance 2006: 363-364 |
| 2005 |
9 | | Yi-Min Wang,
Doug Beck,
Binh Vo,
Roussi Roussev,
Chad Verbowski:
Detecting Stealth Software with Strider GhostBuster.
DSN 2005: 368-377 |
8 | | Shuo Chen,
John Dunagan,
Chad Verbowski,
Yi-Min Wang:
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities.
NDSS 2005 |
| 2004 |
7 | | John Dunagan,
Roussi Roussev,
Brad Daniels,
Aaron Johnson,
Chad Verbowski,
Yi-Min Wang:
Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests.
ICAC 2004: 106-113 |
6 | | Chad Verbowski,
John Dunagan,
Brad Daniels,
Yi-Min Wang:
Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration.
LISA 2004 |
5 | | Yi-Min Wang,
Roussi Roussev,
Chad Verbowski,
Aaron Johnson,
Ming-Wei Wu,
Yennun Huang,
Sy-Yen Kuo:
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
LISA 2004: 33-46 |
4 | | Yi-Min Wang,
Lili Qiu,
Chad Verbowski,
Dimitris Achlioptas,
Gautam Das,
Per-Åke Larson:
Summary-based routing for content-based event distribution networks.
Computer Communication Review 34(5): 59-74 (2004) |
3 | | Yi-Min Wang,
Chad Verbowski,
John Dunagan,
Yu Chen,
Helen J. Wang,
Chun Yuan,
Zheng Zhang:
Strider: a black-box, state-based approach to change and configuration management and support.
Sci. Comput. Program. 53(2): 143-164 (2004) |
| 2003 |
2 | | Yi-Min Wang,
Chad Verbowski,
Daniel R. Simon:
Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures.
DSN 2003: 311-316 |
1 | | Yi-Min Wang,
Chad Verbowski,
John Dunagan,
Yu Chen,
Helen J. Wang,
Chun Yuan,
Zheng Zhang:
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support.
LISA 2003: 159-172 |