Stefan Savage
![]() |
Google Scholar link for current publications
2015
- Security by Any Other Name: On the Effectiveness of Provider Based Email Security- Proceedings of the ACM Conference on Computer and Communications Security, Denver, Colorado, October 2015. ,
- From .academy to .zone: An Analysis of the New TLD Land Rush- Proceedings of the ACM Internet Measurement Conference, Tokyo, Japan, October 2015. ,
- Who is .com? Learning to Parse WHOIS Records- Proceedings of the ACM Internet Measurement Conference, Tokyo, Japan, October 2015. ,
- Framing Dependencies Introduced by Underground Commoditization- Proceedings of the Workshop on the Economics of Information Security (WEIS), Delft, The Netherlands, June 2015. ,
- Affiliate Crookies: Characterizing Affiliate Marketing Abuse- Chachra, Savage and Voelker. IMC 2015
2014
- On The Security of Mobile Cockpit Information Systems,- Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014. ,
- Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild,- Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014. ,
- Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise,- Proceedings of the ACM SIGKDD Conference, New York, NY, August 2014. ,
- Botnet Bitcoin Mining.- Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Kirill Levchenko, Alex C. Snoeren, Stefan Savage, Nicholas Weaver, Chris Grier, and Damon McCoy. Proceedings of the Network and Distributed System Security Symposium. San Diego, CA, February 2014.
- Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting,- Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014, pages 4:1:1-4:1:13. ,
- XXXtortion? Inferring Registration Intent in the .XXX TLD,- Proceedings of the International World Wide Web Conference (WWW)`, Seoul, Korea, April 2014, pages 901-912. ,
2013
- A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.- Meiklejohn, Pomarole, Jordan, Levchenko, McCoy, Voelker and Savage. IMC 2013. A Variational Approximation for Topic Modeling of Hierarchical Corpora. Kim, Voelker and Saul. ICML 2013.
- Juice: A Longitudinal Study of an SEO Campaign. - Wang, Savage and Voelker. NDSS 2013.
- A Comparison of Syslog and IS-IS for Monitoring Link State.- Daniel Turner, Kirill Levchenko, Stefan Savage, and Alex C. Snoeren. Proceedings of the ACM/USENIX Internet Measurement Conference. Barcelona, Spain, October 2013.
2012
- Taster's Choice: A Comparative Analysis of Spam Feeds.- Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Boston, MA, November 2012.
- Priceless: The Role of Payments in Abuse-advertised Goods.- Damon McCoy, Hitesch Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012.
- Manufacturing Compromise: The Emergence of Exploit-as-a-Service.- Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012.
- PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.- Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko, Proceedings of the USENIX Security Symposium, Bellevue, WA, August 2012.
- When Good Services Go Wild: Reassembling Web Services for Unintended Purposes.- Feng Lu, Jiaqi Zhang, and Stefan Savage, Proceedings of the USENIX Workshop on Hot Topics in Security, Bellevue, WA, August 2012.
- scc: Informed Provisioning of Storage for Cluster Applications.- Harsha V. Madhyastha, John C. McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, and Amin Vahdat, USENIX ;login: 37(3), June 2012.
- Measuring the Cost of Cybercrime.- Ross Anderson, Chris Barton, Rainer Boehme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage, Proceedings of the Workshop on the Economics of Information Security (WEIS), Berlin, Germany, June 2012.
- Return-Oriented Programming: Systems, Languages and Applications.- Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage, ACM Transactions on Information and System Security 15(1), March 2012.
- Improving Software Diagnosability via Log Enhancement.- Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, and Stefan Savage, ACM Transactions on Computer Systems 30(1), February 2012.
- BlueSky: A Cloud-Backed File System for the Enterprise.- Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012.
- scc: Cluster Storage Provisioning Informed by Application Characteristics and SLAs.- Harsha V. Madhyastha, John C. McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012.
- Browser Exploits as a Service: The Monetization of Driveby Downloads.- Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012.
- Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. - Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael M. Lee, Xiaoming Tang, Yuanyuan Zhou and Stefan Savage. Proceedings of the 9th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI'12), Hollywood, CA, October 2012.
2011
- An Analysis of Underground Forums.- Marti Motoyama, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Berlin, CA, November 2011.
- Judging a site by its content: learning the textual, structural, and visual features of malicious Web pages.- Sushma Nagesh Bannur, Lawrence K. Saul, and Stefan Savage, Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011.
- Cloak and Dagger: Dynamics of Web Search Cloaking.- David Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL, October 2011.
- On the Empirical Performance of Self-calibrating WiFi Location Systems.- Daniel Turner, Stefan Savage, and Alex C. Snoeren, Proceedings of IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, October 2011.
- Interview with Stefan Savage: On the Spam Payment Trail.- Rik Farrow and Stefan Savage, USENIX ;login: 36(4):7-20, August 2011.
- Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks.- Keaton Mowery, Sarah Meiklejohn, and Stefan Savage, Proceedings of Workshop On Offensive Technologies (WOOT), August 2011.
- No Plan Survives Contact: Experience with Cybercrime Measurement.- Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011.
- Show Me the Money: Characterizing Spam-advertised Revenue.- Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
- Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.- Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
- Comprehensive Experimental Analyses of Automotive Attack Surfaces.- Stephen Checkoway, Damon McCoy, Danny Anderson, Brian Kantor, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
- DefenestraTor: Throwing out Windows in Tor.- Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011.
- Privacy-preserving Network Forensics.- Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, and Geoffrey M. Voelker, Communications of the Association for Computing Machinery 54(5):78-87, May 2011.
- Click Trajectories: End-to-End Analysis of the Spam Value Chain.- Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011.
- Learning to Detect Malicious URLs.- Justin Ma, Lawrence K Saul, Stefan Savage, and Geoffrey M Voelker, ACM Transactions on Intelligent Systems and Technology (TIST) 2(3):30:1-30:24, April 2011.
- On the Effects of Registrar-level Intervention.- He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, March 2011.
- Got Traffic? An Evaluation of Click Traffic Providers.- Qing Zhang, Thomas Ristenpart, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the WICOM/AIRWeb Workshop on Web Quality (WebQuality), Hyderabad, India, March 2011.
- Improving Software Diagnosability via Log Enhancement.- Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, and Stefan Savage. Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Newport Beach, CA, March 2011.
- Return-Oriented Programming: Systems, Languages, and Applications.- R. Roemer, E. Buchanan, H. Shacham, and S. Savage. ACM Trans. Info. & Sys. Security, 2011 2010:
2010
- How to Tell an Airport from a Home: Techniques and Application.- Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martin Abadi, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, CA, October 2010.
- Difference Engine: Harnessing Memory Redundancy in Virtual Machines.- Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, Communications of the Association for Computing Machinery 53(10):85-93, October 2010.
- California Fault Lines: Understanding the Causes and Impact of Network Failures.- Daniel Turner, Kirill Levchenko, Alex C. Snoeren, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, New Delhi, India, August 2010.
- Re: CAPTCHAs -- Understanding CAPTCHA-Solving from an Economic Context.- Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Security Symposium, Washington, D.C., August 2010, pages 435-452.
- Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits.- Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Washington D.C., July 2010, pages 105-114.
- Measuring Online Service Availability Using Twitter.- Marti Motoyama, Brendan Meeder, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of ACM Workshop on Online Social Networks (WOSN), Boston, MA, June 2010, pages 13:1-13:9.
- SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments.- Yuvraj Agarwal, Stefan Savage, and Rajesh Gupta, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2010.
- Experimental Security Analysis of a Modern Automobile.- Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage, Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2010.
- Neon: System Support for Derived Data Management.- Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Pittsburgh, PA, March 2010
- Botnet Judo: Fighting Spam with Itself.- Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, and Stefan Savage, Proceedings of the Network and Diestributed System Security Symposium (NDSS), San Diego, CA, February 2010.
2009
- Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds.- Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL, November 2009
- When Private Keys are Public: Results from the 2008 Debian OpenSSL Debacle.- Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Chicago, IL, November 2009.
- Spamalytics: An Empirical Analysis of Spam Marketing Conversion.- Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Communications of the Association for Computing Machinery 52(9):99-107, September 2009.
- Identifying Suspicious URLs: An application of Large-Scale Online Learning.- Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Conference on Machine Learning, Montreal, Quebec, June 2009.
- Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs.- Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Paris, France, June 2009.
- Spamcraft: An Inside Look at Spam Campaign Orchestration.- Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, April 2009.
- Difference Engine: Harnessing Memory Redundancy in Virtual Machines.- Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, USENIX ;login: 34(2), April 2009.
- Cumulus: Filesystem Backup to the Cloud.- Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009.
- Detecting Malicious Packet Losses.- Alper Mizrak, Stefan Savage, and Keith Marzullo. IEEE Transactions on Parallel and Distributed Systems 20(2), February 2009.
2008
- Difference Engine: Harnessing Memory Redundancy in Virtual Machines.- Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, Proceedings of the 8th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), San Diego, CA, December 2008. (Award paper).
- Spamalytics: an Empirical Analysis of Spam Marketing Conversion.- Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008.
- Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding.- Benjamin Laxton, Kai Wang, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008.
- When Good Instructions Go Bad: Generalizing Return-oriented Programming to the SPARC.- Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008.
- XL: An Efficient Network Routing Algorithm.- Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008.
- Storm: When Researchers Collide.- Brandon Enright, Geoff M. Voelker, Stefan Savage, Chris Kanich, and Kirill Levchenko, USENIX ;login: 33(4), August 2008.
- On the Spam Campaign Trail.- Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson and Stefan Savage. Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.
- The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.- Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker and Stefan Savage. Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.
- Detecting Compromised Routers via Packet Forwarding Behavior.- Alper Mizrak, Stefan Savage and Keith Marzullo. IEEE Network 22(2), March 2008.
2007
- An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.- Jason Franklin, Vern Paxson, Adrian Perrig, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2007.
- Automated Cross-Layer Diagnosis of Enterprise Wireless Networks.- Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Peter Benko, Jennifer Chiang, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage. Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.
- Slicing Spam with Occam's Razor.- Chris Fleizach, Geoffrey M. Voelker and Stefan Savage. Proceedings of the Conference on Email and Anti-Spam (CEAS), Mountain View, CA, August 2007.
- Spamscatter: Characterizing Internet Scam Hosting Infrastructure.- David S. Anderson, Chris Fleizach, Stefan Savage and Geoffrey M. Voelker. Proceedings of the USENIX Security Symposium, Boston, MA, August 2007.
2006
- Maximizing Data Locality in Distributed Systems.- Fan Chung, Ronald Graham, Ranjita Bhagwan, Stefan Savage and Geoffrey M. Voelker. Journal of Computer and System Sciences, 72(8), December 2006.
- Automated Protocol Inference: Unexpected Means of Identifying Protocols.- Justin Ma, Kirill Levchenko, Cristian Kriebich, Stefan Savage and Geoffrey M. Voelker. Proceedings of the ACM Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
- Finding Diversity in Remote Code Injection Exploits.- Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage and and Geoffrey M. Voelker. Proceedings of the ACM Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
- Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis.- Yu-Chung Cheng, John Bellardo, Peter Benko, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage. Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.
- Inferring Internet Denial-of-Service Activity.- David Moore, Colleen Shannon, Doug Brown, Geoffrey M. Voelker, and Stefan Savage, ACM Transactions on Computer Systems 24(2):115-139, May 2006.
- Detecting and Isolating Malicious Routers.- Alper Mizrak, Yu-Chung Cheng, Keith Marzullo, and Stefan Savage. IEEE Transactions on Dependable and Secure Computing, Vol. 3, Issue 3, pp. 230-44, July-Sept. 2006.
- Fatih: Detecting and Isolating Malicious Routers via Traffic Validation.- Alper Mizrak, Yu-Chung Cheng, Keith Marzullo, and Stefan Savage. IEEE Transactions on Dependable and Secure Computing, 3(3), July 2006.
2005
- Opportunistic Measurement: Extracting Insight from Spurious Traffic.- Martin Casado, Tal Garfinkel, Weidong Cui, Vern Paxson, and Stefan Savage. Proceedings of the 4th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, November 2005.
- Self-Stopping Worms.- Justin Ma, Geoffrey M. Voelker and Stefan Savage. Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington D.C., November 2005.
- Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm.- Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage. Proceedings of the ACM Symposium on Operating System Principles (SOSP), Brighton, UK, October 2005.
- SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks.- Ishwar Ramani and Stefan Savage. Proceedings of the IEEE Infocom Conference, Miami, FL, March 2005.
- Fatih: Detecting and Isolating Malicious Routers.- Alper Mizrak, Yu-Chung Cheng, Keith Marzullo and Stefan Savage. Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, June 2005.
2004
- Automated Worm Fingerprinting.- Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage. Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, San Francisco, CA, December 2004.
- Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying.- Yu-Chung Cheng, Urs Hoelzle, Neal Cardwell, Stefan Savage, and Geoffrey M. Voelker. Proceedings of the USENIX Technical Conference, Boston, MA, June 2004.
- TotalRecall: System Support for Automated Availability Management.- Ranjita Bhagwan, Kiran Tati, Yuchung Cheng, Stefan Savage and Geoffrey M. Voelker. Proceedings of the ACM/USENIX Symposium on Networked Systems Design and Implementation, San Francisco, CA, March 2004.
- Fault-Tolerant Forwarding in the Face of Malicious Routers.- Alper Mizrak, Keith Marzullo and Stefan Savage. Proceedings of the International Workshop on the Future Directions in Distributed Computing, Bertinoro, Italy, June 2004.