Segui
Chad Verbowski
Chad Verbowski
University of Edinburgh
Email verificata su verbowski.com
Titolo
Citata da
Citata da
Anno
SubVirt: Implementing malware with virtual machines
ST King, PM Chen
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-327, 2006
7012006
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
YM Wang
13th Annual Network and Distributed System Security Symposium (NDSS), 2006, 2006
608*2006
Cybersquatter patrol
YM Wang, D Beck, C Verbowski, B Daniels, M Ma
US Patent 7,756,987, 2010
3342010
Detecting stealth software with strider ghostbuster
YM Wang, D Beck, B Vo, R Roussev, C Verbowski
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
2882005
State based configuration failure detection using checkpoint comparison
C Verbowski, YM Wang
US Patent App. 10/464,118, 2004
2552004
Strider: A black-box, state-based approach to change and configuration management and support
YM Wang, C Verbowski, J Dunagan, Y Chen, HJ Wang, C Yuan, Z Zhang
Science of Computer Programming 53 (2), 143-164, 2004
2512004
Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.
YM Wang, D Beck, J Wang, C Verbowski, B Daniels
SRUTI 6 (31-36), 2-2, 2006
1432006
Fingerprinting event logs for system management troubleshooting
R Panigrahy, C Verbowski, Y Xie, J Yang, D Yuan
US Patent 8,069,374, 2011
1272011
Summary-based routing for content-based event distribution networks
YM Wang, L Qiu, CE Verbowski, D Achlioptas, G Das, PA Larson
US Patent 7,200,675, 2007
1262007
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
YM Wang, R Roussev, C Verbowski, A Johnson, MW Wu, Y Huang, ...
LISA 4, 33-46, 2004
1122004
Changed file identification, software conflict resolution and unwanted file removal
YM Wang, AR Johnson, DC Ladd, RA Roussev, CE Verbowski
US Patent 7,765,592, 2010
1032010
Context-based online configuration-error detection
D Yuan, Y Xie, R Panigrahy, J Yang, C Verbowski, A Kumar
Proceedings of the 2011 USENIX conference on USENIX annual technical …, 2011
972011
Flight data recorder: Monitoring persistent-state interactions to improve systems management
C Verbowski, E Kiciman, A Kumar, B Daniels, S Lu, J Lee, YM Wang, ...
Proceedings of the 7th symposium on Operating systems design and …, 2006
862006
Method and system for detecting infection of an operating system
DR Beck, AR Johnson, RA Roussev, CE Verbowski, BD Vo, YM Wang
US Patent 7,627,898, 2009
842009
Managing spyware and unwanted software through auto-start extensibility points
YM Wang, C Verbowski, A Johnson, R Roussev
US Patent App. 10/952,336, 2005
812005
Isolation environment-based information access
JR Lorch, YM Wang, C Verbowski, HJ Wang, S King
US Patent 8,024,815, 2011
762011
Method and system for analyzing the impact of a software update
BR Daniels, J Dunagan, RA Roussev, CE Verbowski, YM Wang
US Patent 7,614,046, 2009
722009
Towards a self-managing software patching process using black-box persistent-state manifests
J Dunagan, R Roussev, B Daniels, A Johnson, C Verbowski, YM Wang
International Conference on Autonomic Computing, 2004. Proceedings., 106-113, 2004
612004
Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
CE Verbowski, JH Wang, JC Platt, R Zhang, Y Chen
US Patent 7,584,382, 2009
602009
Thread interception and analysis
C Verbowski, B Daniels, J Dunagan, S Lu, R Roussev, J Lee, A Kumar
US Patent 7,716,530, 2010
582010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20