Follow
Stefan Savage
Stefan Savage
Professor of Computer Science and Engineering, UC San Diego
Verified email at cs.ucsd.edu - Homepage
Title
Cited by
Year
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
E Liu, G Kappos, E Mugnier, L Invernizzi, S Savage, D Tao, K Thomas, ...
arXiv preprint arXiv:2405.09757, 2024
2024
Unfiltered: Measuring Cloud-based Email Filtering Bypasses
S Rao, E Liu, G Ho, GM Voelker, S Savage
Proceedings of the ACM on Web Conference 2024, 1702-1711, 2024
2024
An Empirical Analysis on the Use and Reporting of National Security Letters
A Bellon, M Haller, A Labunets, E Liu, S Savage
arXiv preprint arXiv:2403.02768, 2024
2024
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates
M Ariana, H Grant, S Stefan, V Geoffrey M
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
2023
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild
K Izhikevich, GM Voelker, S Savage, L Izhikevich
2023
In the Line of Fire: Risks of DPI-triggered Data Collection
A Mirian, A Ukani, I Foster, G Akiwate, T Halicioglu, CT Moore, ...
Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 57-63, 2023
2023
Forward pass: On the security implications of email forwarding mechanism and policy
E Liu, G Akiwate, M Jonker, A Mirian, G Ho, GM Voelker, S Savage
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 373-391, 2023
52023
WaVe: a verifiably secure WebAssembly sandboxing runtime
E Johnson, E Laufer, Z Zhao, D Gohman, S Narayan, S Savage, D Stefan, ...
2023 IEEE Symposium on Security and Privacy (SP), 2940-2955, 2023
172023
Understanding the viability of gmail's origin indicator for identifying the sender
E Liu, L Sun, A Bellon, G Ho, GM Voelker, S Savage, INS Munyaka
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 77-95, 2023
22023
No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps
E Liu, S Rao, S Havron, G Ho, S Savage, GM Voelker, D McCoy
Proceedings on Privacy Enhancing Technologies, 2023
132023
The Challenges of Blockchain-Based Naming Systems for Malware Defenders
A Randall, W Hardaker, GM Voelker, S Savage, A Schulman
2022 APWG Symposium on Electronic Crime Research (eCrime), 1-14, 2022
12022
Inside-out and backwards: a retrospective look at how measurement research really happens
S Savage
Proceedings of the 22nd ACM Internet Measurement Conference, 1-1, 2022
2022
Where. ru? Assessing the impact of conflict on Russian domain infrastructure
M Jonker, G Akiwate, A Affinito, kc Claffy, A Botta, GM Voelker, ...
Proceedings of the 22nd ACM Internet Measurement Conference, 159-165, 2022
52022
Measuring UID smuggling in the wild
A Randall, P Snyder, A Ukani, AC Snoeren, GM Voelker, S Savage, ...
Proceedings of the 22nd ACM Internet Measurement Conference, 230-243, 2022
62022
Retroactive identification of targeted DNS infrastructure hijacking
G Akiwate, R Sommese, M Jonker, Z Durumeric, KC Claffy, GM Voelker, ...
Proceedings of the 22nd ACM Internet Measurement Conference, 14-32, 2022
72022
Measuring security practices
LF DeKoven, A Randall, A Mirian, G Akiwate, A Blume, LK Saul, ...
Communications of the ACM 65 (9), 93-102, 2022
22022
Domain Name Lifetimes: Baseline and Threats.
A Affinito, R Sommese, G Akiwate, S Savage, kc claffy, GM Voelker, ...
TMA, 2022
72022
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild
A Randall, P Snyder, A Ukani, A Snoeren, G Voelker, S Savage, ...
arXiv preprint arXiv:2203.10188, 2022
12022
Home is where the hijacking is: understanding DNS interception by residential routers
A Randall, E Liu, R Padmanabhan, G Akiwate, GM Voelker, S Savage, ...
Proceedings of the 21st ACM Internet Measurement Conference, 390-397, 2021
102021
Who's got your mail? characterizing mail service provider usage
E Liu, G Akiwate, M Jonker, A Mirian, S Savage, GM Voelker
Proceedings of the 21st ACM Internet Measurement Conference, 122-136, 2021
152021
The system can't perform the operation now. Try again later.
Articles 1–20