[go: up one dir, main page]

Follow
Samuel T King
Samuel T King
Verified email at ucdavis.edu - Homepage
Title
Cited by
Cited by
Year
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
GW Dunlap, ST King, S Cinar, MA Basrai, PM Chen
ACM SIGOPS Operating Systems Review 36 (SI), 211-224, 2002
16202002
Backtracking intrusions
ST King, PM Chen
Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003
7452003
Debugging the data plane with anteater
H Mai, A Khurshid, R Agarwal, M Caesar, PB Godfrey, ST King
ACM SIGCOMM Computer Communication Review 41 (4), 290-301, 2011
7362011
SubVirt: Implementing malware with virtual machines
ST King, PM Chen
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-327, 2006
7172006
Operating System Support for Virtual Machines.
ST King, GW Dunlap, PM Chen
USENIX Annual Technical Conference, General Track, 71-84, 2003
5362003
Debugging operating systems with time-traveling virtual machines
ST King, GW Dunlap, PM Chen
Proceedings of the 2005 USENIX Technical Conference, 1-15, 2005
5032005
Designing and Implementing Malicious Hardware.
ST King, JA Tucek, A Cozzie, C Grier, W Jiang, Y Zhou
Leet 8, 1-8, 2008
4762008
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
M Hicks, M Finnicum, ST King, MMK Martin, JM Smith
2010 IEEE symposium on security and privacy, 159-172, 2010
4442010
Detecting past and present intrusions through vulnerability-specific predicates
A Joshi, ST King, GW Dunlap, PM Chen
ACM SIGOPS Operating Systems Review 39 (5), 91-104, 2005
3942005
The Multi-Principal OS Construction of the Gazelle Web Browser.
HJ Wang, C Grier, A Moshchuk, ST King, P Choudhury, H Venter
USENIX security symposium 28, 2009
2642009
Secure web browsing with the OP web browser
C Grier, S Tang, ST King
2008 IEEE Symposium on Security and Privacy (sp 2008), 402-416, 2008
2642008
Enriching intrusion alerts through multi-host causality.
ST King, ZM Mao, DG Lucchetti, PM Chen
Ndss, 2005
2512005
Vetting browser extensions for security vulnerabilities with vex
S Bandhakavi, N Tiku, W Pittman, ST King, P Madhusudan, M Winslett
Communications of the ACM 54 (9), 91-99, 2011
2412011
Backtracking intrusions
ST King, PM Chen
ACM Transactions on Computer Systems (TOCS) 23 (1), 51-76, 2005
2002005
Digging for Data Structures.
A Cozzie, F Stratton, H Xue, ST King
OSDI 8, 255-266, 2008
1952008
Defeating UCI: Building stealthy and malicious hardware
C Sturton, M Hicks, D Wagner, ST King
2011 IEEE symposium on security and privacy, 64-77, 2011
1932011
Capo: a software-hardware interface for practical deterministic multiprocessor replay
P Montesinos, M Hicks, ST King, J Torrellas
Proceedings of the 14th international conference on Architectural support …, 2009
1562009
Mavmm: Lightweight and purpose built vmm for malware analysis
AM Nguyen, N Schear, HD Jung, A Godiyal, ST King, HD Nguyen
2009 Annual Computer Security Applications Conference, 441-450, 2009
1362009
Trust and protection in the illinois browser operating system
S Tang, H Mai, ST King
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
1242010
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
M Hicks, C Sturton, ST King, JM Smith
Proceedings of the Twentieth International Conference on Architectural …, 2015
1142015
The system can't perform the operation now. Try again later.
Articles 1–20