Stefan Savage

Results: 69



#Item
1Cryptocurrencies / Bitcoin / Concurrent computing / Computing / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Mining pool / ZeroAccess botnet / Satoshi Nakamoto

Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier∗ , Damon McCoy† , Stefan Savage, Nicholas Weaver∗ Alex C. Snoeren and Kirill Levchenko UC San D

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
2Cryptocurrencies / Bitcoin / Economy / Money / Financial technology / Alternative currencies / Digital currencies / Blockchains / Mt. Gox / Satoshi Nakamoto / Blockchain.info / BitPay

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names Sarah Meiklejohn Marjori Pomarole Grant Jordan † Kirill Levchenko Damon McCoy Geoffrey M. Voelker Stefan Savage University of California, San Diego

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
3

NSF Proposal TWC: Frontier: Collaborative: Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives Stefan Savage, Geoffrey M. Voelker, James Fowler, Alex Snoeren,

Add to Reading List

Source URL: evidencebasedsecurity.org

Language: English - Date: 2012-08-23 18:52:09
    4Computing / Cyberwarfare / Security engineering / Computer security / Carnegie Mellon University / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer emergency response team / IPv6 / WHOIS / United States Computer Emergency Readiness Team

    You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li† Zakir Durumeric∗‡? Jakub Czyz∗ Mohammad Karami Michael Bailey‡ Damon McCoy. Stefan Savage◦ Vern Paxson†? of California

    Add to Reading List

    Source URL: mdbailey.ece.illinois.edu

    Language: English - Date: 2016-10-12 00:39:36
    5Technology / Computing / Security engineering / Hacking / Computer network security / Wireless networking / On-board diagnostics / Global Positioning System / Bluetooth / Computer security / Wi-Fi / Electronic control unit

    Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage University of California, San Diego Karl Koscher, Alexei Cz

    Add to Reading List

    Source URL: www.autosec.org

    Language: English - Date: 2017-05-03 20:00:20
    6

    How to have a good career in computer science Stefan Savage First… • Who am I? (why should anyone believe me?)

    Add to Reading List

    Source URL: www.taoli.ece.ufl.edu

    Language: English
      7

      A Fistful of Bitcoins: Characterizing Payments Among Men with No Names Sarah Meiklejohn Marjori Pomarole Grant Jordan † Kirill Levchenko Damon McCoy Geoffrey M. Voelker Stefan Savage University of California, San Diego

      Add to Reading List

      Source URL: cseweb.ucsd.edu

      - Date: 2013-08-21 12:17:11
        8

        to stay in touch, subscribe to our email alert and r UW CSE 2016 Alumni Achievement Awards CSE honored two extraordinarily accomplished alumni — Albert Greenberg and Stefan Savage — during its June 10th graduation c

        Add to Reading List

        Source URL: lazowska.cs.washington.edu

        - Date: 2016-06-07 17:12:40
          9

          Extensibility, Safety and Performance in the SPIN Operating System Brian N. Bershad Stefan Savage Przemysław Pardyak Emin G¨un Sirer Marc E. Fiuczynski David Becker Craig Chambers Susan Eggers

          Add to Reading List

          Source URL: cseweb.ucsd.edu

          - Date: 1999-10-15 16:19:08
            UPDATE