default search action
Geoffrey M. Voelker
Person information
- affiliation: University of California, San Diego, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c139]Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, Liz Izhikevich:
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild. EuroS&P 2024: 95-113 - [c138]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. IMC 2024: 704-712 - [c137]Sumanth Rao, Enze Liu, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Unfiltered: Measuring Cloud-based Email Filtering Bypasses. WWW 2024: 1702-1711 - [i8]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. CoRR abs/2405.09757 (2024) - [i7]Enze Liu, Elisa Luo, Jian Chen Yan, Katherine Izhikevich, Stewart Grant, Deian Stefan, Geoffrey M. Voelker, Stefan Savage:
Count of Monte Crypto: Accounting-based Defenses for Cross-Chain Bridges. CoRR abs/2410.01107 (2024) - 2023
- [j33]Enze Liu, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proc. Priv. Enhancing Technol. 2023(1): 207-224 (2023) - [c136]Ariana Mirian, Grant Ho, Stefan Savage, Geoffrey M. Voelker:
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates. ACSAC 2023: 150-162 - [c135]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. EuroS&P 2023: 373-391 - [c134]Enze Liu, Lu Sun, Alex Bellon, Grant Ho, Geoffrey M. Voelker, Stefan Savage, Imani N. S. Munyaka:
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender. SOUPS 2023: 77-95 - [c133]Ariana Mirian, Alisha Ukani, Ian D. Foster, Gautam Akiwate, Taner Halicioglu, Cynthia T. Moore, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
In the Line of Fire: Risks of DPI-triggered Data Collection. CSET @ USENIX Security Symposium 2023: 57-63 - [i6]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. CoRR abs/2302.07287 (2023) - [i5]Katherine Izhikevich, Geoff Voelker, Stefan Savage, Liz Izhikevich:
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild. CoRR abs/2312.00580 (2023) - 2022
- [j32]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring security practices. Commun. ACM 65(9): 93-102 (2022) - [c132]Audrey Randall, Wes Hardaker, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
The Challenges of Blockchain-Based Naming Systems for Malware Defenders. eCrime 2022: 1-14 - [c131]Lixiang Ao, George Porter, Geoffrey M. Voelker:
FaaSnap: FaaS made fast using snapshot-based VMs. EuroSys 2022: 730-746 - [c130]Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc claffy, Geoffrey M. Voelker, Stefan Savage:
Retroactive identification of targeted DNS infrastructure hijacking. IMC 2022: 14-32 - [c129]Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc claffy, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij, Stefan Savage:
Where .ru?: assessing the impact of conflict on russian domain infrastructure. IMC 2022: 159-165 - [c128]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Measuring UID smuggling in the wild. IMC 2022: 230-243 - [c127]Antonia Affinito, Raffaele Sommese, Gautam Akiwate, Stefan Savage, kc claffy, Geoffrey M. Voelker, Alessio Botta, Mattijs Jonker:
Domain Name Lifetimes: Baseline and Threats. TMA 2022 - [i4]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoff Voelker, Stefan Savage, Aaron Schulman:
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild. CoRR abs/2203.10188 (2022) - 2021
- [c126]Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker:
Who's got your mail?: characterizing mail service provider usage. Internet Measurement Conference 2021: 122-136 - [c125]Audrey Randall, Enze Liu, Ramakrishna Padmanabhan, Gautam Akiwate, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Home is where the hijacking is: understanding DNS interception by residential routers. Internet Measurement Conference 2021: 390-397 - [c124]Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, Kimberly C. Claffy:
Risky BIZness: risks derived from registrar name management. Internet Measurement Conference 2021: 673-686 - [c123]Vector Guo Li, Gautam Akiwate, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Clairvoyance: Inferring Blocklist Use on the Internet. PAM 2021: 57-75 - [c122]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - [c121]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. USENIX Security Symposium 2021: 3093-3110 - [i3]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement (Extended Report). CoRR abs/2105.13442 (2021) - 2020
- [j31]Geoffrey M. Voelker:
Technical perspective: Fake 'likes' and targeting collusion networks. Commun. ACM 63(5): 102 (2020) - [c120]Shelby Thomas, Lixiang Ao, Geoffrey M. Voelker, George Porter:
Particle: ephemeral endpoints for serverless networking. SoCC 2020: 16-29 - [c119]Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers. Internet Measurement Conference 2020: 50-64 - [c118]Gautam Akiwate, Mattijs Jonker, Raffaele Sommese, Ian D. Foster, Geoffrey M. Voelker, Stefan Savage, kc claffy:
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. Internet Measurement Conference 2020: 281-294
2010 – 2019
- 2019
- [j30]Andrea C. Arpaci-Dusseau, Geoffrey M. Voelker:
Introduction to the Special Section on OSDI'18. ACM Trans. Storage 15(2): 12:1 (2019) - [c117]Ariana Mirian, Nikunj Bhagat, Caitlin Sadowski, Adrienne Porter Felt, Stefan Savage, Geoffrey M. Voelker:
Web feature deprecation: a case study for chrome. ICSE (SEIP) 2019: 302-311 - [c116]Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring Security Practices and How They Impact Security. Internet Measurement Conference 2019: 36-49 - [c115]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - [c114]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [c113]Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Kurt Thomas:
Hack for Hire: Exploring the Emerging Market for Account Hijacking. WWW 2019: 1279-1289 - [i2]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [c112]Shelby Thomas, Rob McGuinness, Geoffrey M. Voelker, George Porter:
Dark packets and the end of network scaling. ANCS 2018: 1-14 - [c111]Lixiang Ao, Liz Izhikevich, Geoffrey M. Voelker, George Porter:
Sprocket: A Serverless Video Processing Framework. SoCC 2018: 263-274 - [c110]Shelby Thomas, Geoffrey M. Voelker, George Porter:
CacheCloud: Towards Speed-of-light Datacenter Communication. HotCloud 2018 - [c109]Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Following Their Footsteps: Characterizing Account Automation Abuse and Defenses. Internet Measurement Conference 2018: 43-55 - [c108]Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Vallina-Rodriguez:
An Empirical Analysis of the Commercial VPN Ecosystem. Internet Measurement Conference 2018: 443-456 - [e4]Andrea C. Arpaci-Dusseau, Geoff Voelker:
13th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2018, Carlsbad, CA, USA, October 8-10, 2018. USENIX Association 2018 [contents] - 2017
- [c107]Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, Alex C. Snoeren:
Exploring the dynamics of search advertiser fraud. Internet Measurement Conference 2017: 157-170 - [c106]Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Alex C. Snoeren:
Tripwire: inferring internet site compromise. Internet Measurement Conference 2017: 341-354 - [c105]Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser. CSET @ USENIX Security Symposium 2017 - 2016
- [j29]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - 2015
- [j28]Patrick Ling, Feng Lu, Alex C. Snoeren, Geoffrey M. Voelker:
Enfold: Downclocking OFDM in Wi-Fi. GetMobile Mob. Comput. Commun. 19(2): 10-13 (2015) - [j27]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
Managing Contention with Medley. IEEE Trans. Mob. Comput. 14(3): 579-591 (2015) - [c104]He Liu, Matthew K. Mukerjee, Conglong Li, Nicolas Feltman, George Papen, Stefan Savage, Srinivasan Seshan, Geoffrey M. Voelker, David G. Andersen, Michael Kaminsky, George Porter, Alex C. Snoeren:
Scheduling techniques for hybrid circuit/packet networks. CoNEXT 2015: 41:1-41:13 - [c103]Neha Chachra, Stefan Savage, Geoffrey M. Voelker:
Affiliate Crookies: Characterizing Affiliate Marketing Abuse. Internet Measurement Conference 2015: 41-47 - [c102]Suqi Liu, Ian D. Foster, Stefan Savage, Geoffrey M. Voelker, Lawrence K. Saul:
Who is .com?: Learning to Parse WHOIS Records. Internet Measurement Conference 2015: 369-380 - [c101]Tristan Halvorson, Matthew F. Der, Ian D. Foster, Stefan Savage, Lawrence K. Saul, Geoffrey M. Voelker:
From .academy to .zone: An Analysis of the New TLD Land Rush. Internet Measurement Conference 2015: 381-394 - [c100]Feng Lu, Hao Du, Ankur Jain, Geoffrey M. Voelker, Alex C. Snoeren, Andreas Terzis:
CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks. HotMobile 2015: 45-50 - 2014
- [c99]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c98]David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Internet Measurement Conference 2014: 359-372 - [c97]Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Knock it off: profiling the online storefronts of counterfeit merchandise. KDD 2014: 1759-1768 - [c96]Feng Lu, Patrick Ling, Geoffrey M. Voelker, Alex C. Snoeren:
Enfold: downclocking OFDM in WiFi. MobiCom 2014: 129-140 - [c95]Qing Zhang, David Y. Wang, Geoffrey M. Voelker:
DSpin: Detecting Automatically Spun Content on the Web. NDSS 2014 - [c94]He Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, George Porter:
Circuit Switching Under the Radar with REACToR. NSDI 2014: 1-15 - [c93]Tristan Halvorson, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
XXXtortion?: inferring registration intent in the .XXX TLD. WWW 2014: 901-912 - [i1]Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul:
Topic Modeling of Hierarchical Corpora. CoRR abs/1409.3518 (2014) - 2013
- [j26]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c92]Rishi Kapoor, Alex C. Snoeren, Geoffrey M. Voelker, George Porter:
Bullet trains: a study of NIC burst behavior at microsecond timescales. CoNEXT 2013: 133-138 - [c91]Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul:
A Variational Approximation for Topic Modeling of Hierarchical Corpora. ICML (2) 2013: 55-63 - [c90]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c89]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Juice: A Longitudinal Study of an SEO Botnet. NDSS 2013 - [c88]Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, Geoffrey M. Voelker:
eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. NSDI 2013: 57-70 - [c87]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
SloMo: Downclocking WiFi Communication. NSDI 2013: 255-268 - 2012
- [c86]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c85]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c84]Rishi Kapoor, George Porter, Malveeka Tewari, Geoffrey M. Voelker, Amin Vahdat:
Chronos: predictable low latency for data center applications. SoCC 2012: 9 - [c83]James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Limitations of scanned human copresence encounters for modelling proximity-borne malware. COMSNETS 2012: 1-10 - [c82]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
BlueSky: a cloud-backed file system for the enterprise. FAST 2012: 19 - [c81]Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage:
Taster's choice: a comparative analysis of spam feeds. Internet Measurement Conference 2012: 427-440 - [c80]Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
Weighted fair queuing with differential dropping. INFOCOM 2012: 2981-2985 - [c79]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - 2011
- [j25]Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker:
Sora: high-performance software radio using general-purpose multi-core processors. Commun. ACM 54(1): 99-107 (2011) - [j24]Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. Commun. ACM 54(5): 78-87 (2011) - [j23]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. 2(3): 30:1-30:24 (2011) - [j22]Diwaker Gupta, Kashi Venkatesh Vishwanath, Marvin McNett, Amin Vahdat, Ken Yocum, Alex C. Snoeren, Geoffrey M. Voelker:
DieCast: Testing Distributed Systems with an Accurate Scale Model. ACM Trans. Comput. Syst. 29(2): 4:1-4:48 (2011) - [c78]Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul:
Topic modeling of freelance job postings to monitor web service abuse. AISec 2011: 11-20 - [c77]David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Cloak and dagger: dynamics of web search cloaking. CCS 2011: 477-490 - [c76]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
An analysis of underground forums. Internet Measurement Conference 2011: 71-80 - [c75]Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, Christophe Diot:
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. INFOCOM 2011: 1179-1187 - [c74]He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker:
On the Effects of Registrar-level Intervention. LEET 2011 - [c73]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c72]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c71]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - [c70]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c69]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. USENIX Security Symposium 2011 - [c68]Qing Zhang, Thomas Ristenpart, Stefan Savage, Geoffrey M. Voelker:
Got traffic?: an evaluation of click traffic providers. WebQuality@WWW 2011: 19-26 - 2010
- [j21]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference engine: harnessing memory redundancy in virtual machines. Commun. ACM 53(10): 85-93 (2010) - [j20]Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren:
Usage Patterns in an Urban WiFi Network. IEEE/ACM Trans. Netw. 18(5): 1359-1372 (2010) - [c67]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c66]Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond heuristics: learning to classify vulnerabilities and predict exploits. KDD 2010: 105-114 - [c65]Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself. NDSS 2010 - [c64]Matteo Varvello, Geoffrey M. Voelker:
Second life: a social network of humans and bots. NOSSDAV 2010: 9-14 - [c63]Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. USENIX Security Symposium 2010: 435-462 - [c62]Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Neon: system support for derived data management. VEE 2010: 63-74 - [c61]Marti Motoyama, Brendan Meeder, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage:
Measuring Online Service Availability Using Twitter. WOSN 2010 - [e3]Shivkumar Kalyanaraman, Venkata N. Padmanabhan, K. K. Ramakrishnan, Rajeev Shorey, Geoffrey M. Voelker:
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010. ACM 2010, ISBN 978-1-4503-0201-2 [contents]
2000 – 2009
- 2009
- [j19]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9): 99-107 (2009) - [j18]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem backup to the cloud. ACM Trans. Storage 5(4): 14:1-14:28 (2009) - [j17]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference Engine. login Usenix Mag. 34(2) (2009) - [j16]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. login Usenix Mag. 34(4) (2009) - [c60]Michael Vrable, Stefan Savage, Geoffrey M. Voelker:
Cumulus: Filesystem Backup to the Cloud. FAST 2009: 225-238 - [c59]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Identifying suspicious URLs: an application of large-scale online learning. ICML 2009: 681-688 - [c58]Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Defending Mobile Phones from Proximity Malware. INFOCOM 2009: 1503-1511 - [c57]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
Beyond blacklists: learning to detect malicious web sites from suspicious URLs. KDD 2009: 1245-1254 - [c56]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. LEET 2009 - [c55]Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang, Mi Chen, Geoffrey M. Voelker:
SAM: enabling practical spatial multiple access in wireless LAN. MobiCom 2009: 49-60 - [c54]Kun Tan, Jiansong Zhang, Ji Fang, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Haitao Wu, Wei Wang, Geoffrey M. Voelker:
Sora: High Performance Software Radio Using General Purpose Multi-core Processors. NSDI 2009: 75-90 - [c53]Bhavish Agarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, Geoffrey M. Voelker:
NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. NSDI 2009: 349-364 - [c52]Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Wenguang Chen, Weimin Zheng, Zheng Zhang, Geoffrey M. Voelker:
MPIWiz: subgroup reproducible replay of mpi applications. PPoPP 2009: 251-260 - [e2]Geoffrey M. Voelker, Alec Wolman:
Proceedings of the 2009 USENIX Annual Technical Conference, USENIX ATC 2009, San Diego, CA, USA, June 14-19, 2009. USENIX Association 2009 [contents] - [d1]Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker:
URL Reputation. UCI Machine Learning Repository, 2009 - 2008
- [j15]Abhishek B. Sharma, Ranjita Bhagwan, Monojit Choudhury, Leana Golubchik, Ramesh Govindan, Geoffrey M. Voelker:
Automatic request categorization in internet services. SIGMETRICS Perform. Evaluation Rev. 36(2): 16-25 (2008) - [j14]Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker:
Dual Frame Motion Compensation With Uneven Quality Assignment. IEEE Trans. Circuits Syst. Video Technol. 18(2): 249-256 (2008) - [j13]Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, Kirill Levchenko:
Storm: When Researchers Collide. login Usenix Mag. 33(4) (2008) - [c51]Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion. CCS 2008: 3-14 - [c50]Haohui Mai, Chongnan Gao, Xuezheng Liu, Xi Wang, Geoffrey M. Voelker:
Towards Automatic Inference of Task Hierarchies in Complex Systems. HotDep 2008 - [c49]Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren:
Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan. Internet Measurement Conference 2008: 85-98 - [c48]Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage:
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. LEET 2008 - [c47]Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
On the Spam Campaign Trail. LEET 2008 - [c46]Geoffrey M. Voelker:
Banal: Because Format Checking Is So Trite. WOWCS 2008 - [c45]Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat:
Difference Engine: Harnessing Memory Redundancy in Virtual Machines. OSDI 2008: 309-322 - [c44]Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage:
Xl: an efficient network routing algorithm. SIGCOMM 2008: 15-26 - 2007
- [j12]Jon Crowcroft, Craig Partridge, Geoffrey M. Voelker, Ellen W. Zegura:
Report from the 2006 SIGCOMM nomination committee. Comput. Commun. Rev. 37(1): 87 (2007) - [c43]Chris Fleizach, Geoffrey M. Voelker, Stefan Savage:
Slicing Spam with Occam's Razor. CEAS 2007 - [c42]Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffrey M. Voelker:
Usher: An Extensible Framework for Managing Clusters of Virtual Machines. LISA 2007: 167-181 - [c41]Yuchung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker:
Automating cross-layer diagnosis of enterprise wireless networks. SIGCOMM 2007: 25-36 - [c40]David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker:
Spamscatter: Characterizing Internet Scam Hosting Infrastructure. USENIX Security Symposium 2007 - 2006
- [j11]Fan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker:
Maximizing data locality in distributed systems. J. Comput. Syst. Sci. 72(8): 1309-1316 (2006) - [j10]David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage:
Inferring Internet denial-of-service activity. ACM Trans. Comput. Syst. 24(2): 115-139 (2006) - [j9]Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao:
Characterization of a Large Web Site Population with Implications for Content Delivery. World Wide Web 9(4): 505-536 (2006) - [c39]Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker:
Finding diversity in remote code injection exploits. Internet Measurement Conference 2006: 53-64 - [c38]Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker:
Unexpected means of protocol inference. Internet Measurement Conference 2006: 313-326 - [c37]Kiran Tati, Geoffrey M. Voelker:
On Object Maintenance in Peer-to-Peer Systems. IPTPS 2006 - [c36]Diwaker Gupta, Ken Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, Geoffrey M. Voelker:
To Infinity and Beyond: Time-Warped Network Emulation. NSDI 2006 - [c35]Yuchung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM 2006: 39-50 - 2005
- [j8]Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl:
Wireless Hotspots: Current Challenges and Future Directions. Mob. Networks Appl. 10(3): 265-274 (2005) - [j7]Marvin McNett, Geoffrey M. Voelker:
Access and mobility of wireless PDA users. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(2): 40-55 (2005) - [c34]Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker:
Error Concealment for Dual Frame Video Coding with Uneven Quality. DCC 2005: 319-328 - [c33]Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SOSP 2005: 148-162 - [c32]Flavio Paiva Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, Geoffrey M. Voelker:
Surviving Internet Catastrophes. USENIX ATC, General Track 2005: 45-60 - [c31]Justin Ma, Geoffrey M. Voelker, Stefan Savage:
Self-stopping worms. WORM 2005: 12-21 - [e1]Geoffrey M. Voelker, Scott Shenker:
Peer-to-Peer Systems III, Third International Workshop, IPTPS 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3279, Springer 2005, ISBN 3-540-24252-X [contents] - 2004
- [c30]Vijay Chellappa, Pamela C. Cosman, Geoffrey M. Voelker:
Dual Frame Motion Compensation with Uneven Quality Assignment. Data Compression Conference 2004: 262-271 - [c29]Ranjita Bhagwan, Kiran Tati, Yuchung Cheng, Stefan Savage, Geoffrey M. Voelker:
Total Recall: System Support for Automated Availability Management. NSDI 2004: 337-350 - [c28]Renata Teixeira, Aman Shaikh, Timothy Griffin, Geoffrey M. Voelker:
Network sensitivity to hot-potato disruptions. SIGCOMM 2004: 231-244 - [c27]Yuchung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker:
Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying. USENIX ATC, General Track 2004: 87-98 - [c26]Kiran Tati, Geoffrey M. Voelker:
ShortCuts: Using Soft State to Improve DHT Routing. WCW 2004: 44-62 - [c25]Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao:
Towards Informed Web Content Delivery. WCW 2004: 232-248 - [c24]Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, Zhen Xiao:
Characterization of a large web site population with implications for content delivery. WWW 2004: 522-533 - 2003
- [j6]Marvin McNett, Geoffrey M. Voelker:
Access and mobility of wireless PDA users. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(4): 55-57 (2003) - [j5]Song Cen, Pamela C. Cosman, Geoffrey M. Voelker:
End-to-end differentiation of congestion and wireless losses. IEEE/ACM Trans. Netw. 11(5): 703-717 (2003) - [c23]Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker:
Replication Strategies for Highly Available Peer-to-Peer Storage. Future Directions in Distributed Computing 2003: 153-158 - [c22]Flavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker:
The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe. HotOS 2003: 73-78 - [c21]Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker:
In search of path diversity in ISP networks. Internet Measurement Conference 2003: 313-318 - [c20]David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage:
Internet Quarantine: Requirements for Containing Self-Propagating Code. INFOCOM 2003: 1901-1910 - [c19]Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelker:
Understanding Availability. IPTPS 2003: 256-267 - [c18]Renata Teixeira, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker:
Characterizing and measuring path diversity of internet topologies. SIGMETRICS 2003: 304-305 - [c17]Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl:
Wireless hotspots: current challenges and future directions. WMASH 2003: 1-9 - 2002
- [j4]Anand Balachandran, Paramvir Bahl, Geoffrey M. Voelker:
Hot-spot congestion relief and service guarantees in public-area wireless networks. Comput. Commun. Rev. 32(1): 59 (2002) - [j3]Paramvir Bahl, Wilf Russell, Yi-Min Wang, Anand Balachandran, Geoffrey M. Voelker, Allen Miu:
PAWNs: Satisfying the need for ubiquitos secure connectivity and location services. IEEE Wirel. Commun. 9(1): 40-48 (2002) - [c16]Allan Snavely, Dean M. Tullsen, Geoffrey M. Voelker:
Symbiotic jobscheduling with priorities for a simultaneous multithreading processor. SIGMETRICS 2002: 66-76 - [c15]Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, P. Venkat Rangan:
Characterizing user behavior and network performance in a public wireless LAN. SIGMETRICS 2002: 195-205 - [c14]Anand Balachandran, Paramvir Bahl, Geoffrey M. Voelker:
Hot-Spot Congestion Relief in Public-Area Wireless Network. WMCSA 2002: 70- - 2001
- [c13]Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker:
On the Placement of Web Server Replicas. INFOCOM 2001: 1587-1596 - [c12]Maureen Chesire, Alec Wolman, Geoffrey M. Voelker, Henry M. Levy:
Measurement and Analysis of a Streaming Media Workload. USITS 2001: 1-12 - [c11]David Moore, Geoffrey M. Voelker, Stefan Savage:
Inferring Internet Denial-of-Service Activity. USENIX Security Symposium 2001 - 2000
- [b1]Geoffrey M. Voelker:
Cooperative caching in local-area and wide-area networks. University of Washington, USA, 2000
1990 – 1999
- 1999
- [j2]Stefan Savage, Thomas E. Anderson, Amit Aggarwal, David Becker, Neal Cardwell, Andy Collins, Eric Hoffman, John Snell, Amin Vahdat, Geoffrey M. Voelker, John Zahorjan:
Detour: informed Internet routing and transport. IEEE Micro 19(1): 50-59 (1999) - [c10]Gretta Bartels, Anna R. Karlin, Darrell C. Anderson, Jeffrey S. Chase, Henry M. Levy, Geoffrey M. Voelker:
Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages. SIGMETRICS 1999: 206-207 - [c9]Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna R. Karlin, Henry M. Levy:
On the scale and performance of cooperative Web proxy caching. SOSP 1999: 16-31 - [c8]Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Molly Brown, Tashana Landray, Denise Pinnel, Anna R. Karlin, Henry M. Levy:
Organization-Based Analysis of Web-Object Sharing and Caching. USENIX Symposium on Internet Technologies and Systems 1999 - 1998
- [j1]Geoffrey M. Voelker:
Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems. ACM SIGOPS Oper. Syst. Rev. 32(4): 3-8 (1998) - [c7]Geoffrey M. Voelker, Eric J. Anderson, Tracy Kimbrel, Michael J. Feeley, Jeffrey S. Chase, Anna R. Karlin, Henry M. Levy:
Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System. SIGMETRICS 1998: 33-43 - 1997
- [c6]Geoffrey M. Voelker, Hervé A. Jamrozik, Mary K. Vernon, Henry M. Levy, Edward D. Lazowska:
Managing Server Load in Global Memory Systems. SIGMETRICS 1997: 127-138 - 1996
- [c5]Theodore H. Romer, Dennis Lee, Geoffrey M. Voelker, Alec Wolman, Wayne A. Wong, Jean-Loup Baer, Brian N. Bershad, Henry M. Levy:
The Structure and Performance of Interpreters. ASPLOS 1996: 150-159 - [c4]Hervé A. Jamrozik, Michael J. Feeley, Geoffrey M. Voelker, James Evans II, Anna R. Karlin, Henry M. Levy, Mary K. Vernon:
Reducing Network Latency Using Subpages in a Global Memory Environment. ASPLOS 1996: 258-267 - 1994
- [c3]Geoffrey M. Voelker, Brian N. Bershad:
Mobisaic: An Information System for a Mobile Wireless Computing Environment. Mobidata 1994: 375-395 - [c2]Alec Wolman, Geoffrey M. Voelker, Chandramohan A. Thekkath:
Latency Analysis of TCP on an ATM Network. USENIX Winter 1994: 167-179 - [c1]Geoffrey M. Voelker, Brian N. Bershad:
Mobisaic: An Information System for a Mobile Wireless Computing Environment. WMCSA 1994: 185-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint