| ReVirt: Enabling intrusion analysis through virtual-machine logging and replay GW Dunlap, ST King, S Cinar, MA Basrai, PM Chen ACM SIGOPS Operating Systems Review 36 (SI), 211-224, 2002 | 1620 | 2002 |
| Backtracking intrusions ST King, PM Chen Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003 | 745 | 2003 |
| Debugging the data plane with anteater H Mai, A Khurshid, R Agarwal, M Caesar, PB Godfrey, ST King ACM SIGCOMM Computer Communication Review 41 (4), 290-301, 2011 | 736 | 2011 |
| SubVirt: Implementing malware with virtual machines ST King, PM Chen 2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-327, 2006 | 717 | 2006 |
| Operating System Support for Virtual Machines. ST King, GW Dunlap, PM Chen USENIX Annual Technical Conference, General Track, 71-84, 2003 | 536 | 2003 |
| Debugging operating systems with time-traveling virtual machines ST King, GW Dunlap, PM Chen Proceedings of the 2005 USENIX Technical Conference, 1-15, 2005 | 503 | 2005 |
| Designing and Implementing Malicious Hardware. ST King, JA Tucek, A Cozzie, C Grier, W Jiang, Y Zhou Leet 8, 1-8, 2008 | 476 | 2008 |
| Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically M Hicks, M Finnicum, ST King, MMK Martin, JM Smith 2010 IEEE symposium on security and privacy, 159-172, 2010 | 444 | 2010 |
| Detecting past and present intrusions through vulnerability-specific predicates A Joshi, ST King, GW Dunlap, PM Chen ACM SIGOPS Operating Systems Review 39 (5), 91-104, 2005 | 394 | 2005 |
| The Multi-Principal OS Construction of the Gazelle Web Browser. HJ Wang, C Grier, A Moshchuk, ST King, P Choudhury, H Venter USENIX security symposium 28, 2009 | 264 | 2009 |
| Secure web browsing with the OP web browser C Grier, S Tang, ST King 2008 IEEE Symposium on Security and Privacy (sp 2008), 402-416, 2008 | 264 | 2008 |
| Enriching intrusion alerts through multi-host causality. ST King, ZM Mao, DG Lucchetti, PM Chen Ndss, 2005 | 251 | 2005 |
| Vetting browser extensions for security vulnerabilities with vex S Bandhakavi, N Tiku, W Pittman, ST King, P Madhusudan, M Winslett Communications of the ACM 54 (9), 91-99, 2011 | 241 | 2011 |
| Backtracking intrusions ST King, PM Chen ACM Transactions on Computer Systems (TOCS) 23 (1), 51-76, 2005 | 200 | 2005 |
| Digging for Data Structures. A Cozzie, F Stratton, H Xue, ST King OSDI 8, 255-266, 2008 | 195 | 2008 |
| Defeating UCI: Building stealthy and malicious hardware C Sturton, M Hicks, D Wagner, ST King 2011 IEEE symposium on security and privacy, 64-77, 2011 | 193 | 2011 |
| Capo: a software-hardware interface for practical deterministic multiprocessor replay P Montesinos, M Hicks, ST King, J Torrellas Proceedings of the 14th international conference on Architectural support …, 2009 | 156 | 2009 |
| Mavmm: Lightweight and purpose built vmm for malware analysis AM Nguyen, N Schear, HD Jung, A Godiyal, ST King, HD Nguyen 2009 Annual Computer Security Applications Conference, 441-450, 2009 | 136 | 2009 |
| Trust and protection in the illinois browser operating system S Tang, H Mai, ST King 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 124 | 2010 |
| Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs M Hicks, C Sturton, ST King, JM Smith Proceedings of the Twentieth International Conference on Architectural …, 2015 | 114 | 2015 |