default search action
Samuel T. King
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Samuel T. King:
Security, extensibility, and redundancy in the Metabolic Operating System. CoRR abs/2401.01357 (2024) - [i5]Hari Venugopalan, Shaoor Munir, Shuaib Ahmed, Tangbaihe Wang, Samuel T. King, Zubair Shafiq:
FP-Inconsistent: Detecting Evasive Bots using Browser Fingerprint Inconsistencies. CoRR abs/2406.07647 (2024) - [i4]Hari Venugopalan, Shreyas Madhav Ambattur Vijayanand, Caleb Stanford, Stephanie Crossen, Samuel T. King:
GlucOS: Security, correctness, and simplicity for automated insulin delivery. CoRR abs/2406.18262 (2024) - 2023
- [j9]Hari Venugopalan, Zain ul Abi Din, Trevor Carpenter, Jason Lowe-Power, Samuel T. King, Zubair Shafiq:
Aragorn: A Privacy-Enhancing System for Mobile Cameras. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(4): 181:1-181:31 (2023) - [i3]Hari Venugopalan, Kaustav Goswami, Zain ul Abi Din, Jason Lowe-Power, Samuel T. King, Zubair Shafiq:
Centauri: Practical Rowhammer Fingerprinting. CoRR abs/2307.00143 (2023) - 2021
- [j8]Samuel T. King, Nolen Scaife, Patrick Traynor, Zain ul Abi Din, Christian Peeters, Hari Venugopalan:
Credit Card Fraud Is a Computer Security Problem. IEEE Secur. Priv. 19(2): 65-69 (2021) - [c35]Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King:
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. SP 2021: 1623-1640 - [i2]Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King:
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. CoRR abs/2106.14861 (2021) - 2020
- [c34]Zain ul Abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits:
PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning. USENIX ATC 2020: 387-400 - [c33]Zain ul Abi Din, Hari Venugopalan, Jaime Park, Andy Li, Weisu Yin, Haohui Mai, Yong Jae Lee, Steven Liu, Samuel T. King:
Boxer: Preventing fraud by scanning credit cards. USENIX Security Symposium 2020: 1571-1588
2010 – 2019
- 2019
- [j7]Cynthia Sturton, Matthew Hicks, Samuel T. King, Jonathan M. Smith:
FinalFilter: Asserting Security Properties of a Processor at Runtime. IEEE Micro 39(4): 35-42 (2019) - [i1]Zain ul Abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits:
Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning. CoRR abs/1905.07444 (2019) - 2018
- [c32]Jason Lowe-Power, Venkatesh Akella, Matthew K. Farrens, Samuel T. King, Christopher J. Nitta:
A case for exposing extra-architectural state in the ISA: position paper. HASP@ISCA 2018: 8:1-8:6 - 2015
- [c31]Matthew Hicks, Cynthia Sturton, Samuel T. King, Jonathan M. Smith:
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs. ASPLOS 2015: 517-529 - 2013
- [c30]Nima Honarmand, Nathan Dautenhahn, Josep Torrellas, Samuel T. King, Gilles Pokam, Cristiano Pereira:
Cyrus: unintrusive application-level record-replay for replay parallelism. ASPLOS 2013: 193-206 - [c29]Haohui Mai, Edgar Pek, Hui Xue, Samuel Talmadge King, Parthasarathy Madhusudan:
Verifying security invariants in ExpressOS. ASPLOS 2013: 293-304 - [c28]Gilles Pokam, Klaus Danne, Cristiano Pereira, Rolf Kassa, Tim Kranich, Shiliang Hu, Justin Emile Gottschlich, Nima Honarmand, Nathan Dautenhahn, Samuel T. King, Josep Torrellas:
QuickRec: prototyping an intel architecture extension for record and replay of multithreaded programs. ISCA 2013: 643-654 - [e1]Samuel T. King:
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013. USENIX Association 2013, ISBN 978-1-931971-03-4 [contents] - 2012
- [c27]Ralf Sasse, Samuel T. King, José Meseguer, Shuo Tang:
IBOS: A Correct-By-Construction Modular Browser. FACS 2012: 224-241 - [c26]Haohui Mai, Shuo Tang, Samuel T. King, Calin Cascaval, Pablo Montesinos:
A Case for Parallelizing Web Pages. HotPar 2012 - [c25]Hui Xue, Nathan Dautenhahn, Samuel T. King:
Using replicated execution for a more secure and reliable web browser. NDSS 2012 - 2011
- [j6]Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett:
Vetting browser extensions for security vulnerabilities with VEX. Commun. ACM 54(9): 91-99 (2011) - [j5]Chris Grier, Shuo Tang, Samuel T. King:
Designing and Implementing the OP and OP2 Web Browsers. ACM Trans. Web 5(2): 11:1-11:35 (2011) - [c24]Shuo Tang, Nathan Dautenhahn, Samuel T. King:
Fortifying web-based applications automatically. CCS 2011: 615-626 - [c23]Anthony Cozzie, Murph Finnicum, Samuel T. King:
Macho: Programming with Man Pages. HotOS 2011 - [c22]Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, Brighten Godfrey, Samuel Talmadge King:
Debugging the data plane with anteater. SIGCOMM 2011: 290-301 - [c21]Cynthia Sturton, Matthew Hicks, David A. Wagner, Samuel T. King:
Defeating UCI: Building Stealthy and Malicious Hardware. IEEE Symposium on Security and Privacy 2011: 64-77 - [c20]Murph Finnicum, Samuel T. King:
Building Secure Robot Applications. HotSec 2011 - 2010
- [j4]Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith:
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. login Usenix Mag. 35(6) (2010) - [c19]Shuo Tang, Haohui Mai, Samuel T. King:
Trust and Protection in the Illinois Browser Operating System. OSDI 2010: 17-32 - [c18]Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith:
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. IEEE Symposium on Security and Privacy 2010: 159-172 - [c17]Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett:
VEX: Vetting Browser Extensions for Security Vulnerabilities. USENIX Security Symposium 2010: 339-354 - [c16]Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King:
Alhambra: a system for creating, enforcing, and testing browser security policies. WWW 2010: 941-950
2000 – 2009
- 2009
- [c15]Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha Godiyal, Samuel T. King, Hai D. Nguyen:
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. ACSAC 2009: 441-450 - [c14]Andrew Lenharth, Vikram S. Adve, Samuel T. King:
Recovery domains: an organizing principle for recoverable operating systems. ASPLOS 2009: 49-60 - [c13]Pablo Montesinos, Matthew Hicks, Samuel T. King, Josep Torrellas:
Capo: a software-hardware interface for practical deterministic multiprocessor replay. ASPLOS 2009: 73-84 - [c12]Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter:
The Multi-Principal OS Construction of the Gazelle Web Browser. USENIX Security Symposium 2009: 417-432 - 2008
- [j3]Samuel T. King, Sean W. Smith:
Virtualization and Security: Back to the Future. IEEE Secur. Priv. 6(5): 15 (2008) - [j2]Chris Grier, Shuo Tang, Samuel T. King:
Building a More Secure Web Browser. login Usenix Mag. 33(4) (2008) - [c11]Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou:
Designing and Implementing Malicious Hardware. LEET 2008 - [c10]Anthony Cozzie, Frank Stratton, Hui Xue, Samuel T. King:
Digging for Data Structures. OSDI 2008: 255-266 - [c9]Chris Grier, Shuo Tang, Samuel T. King:
Secure Web Browsing with the OP Web Browser. SP 2008: 402-416 - 2006
- [b1]Samuel T. King:
Analyzing intrusions using operating system level information flow. University of Michigan, USA, 2006 - [c8]Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King:
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006 - [c7]Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch:
SubVirt: Implementing malware with virtual machines. S&P 2006: 314-327 - 2005
- [j1]Samuel T. King, Peter M. Chen:
Backtracking intrusions. ACM Trans. Comput. Syst. 23(1): 51-76 (2005) - [c6]Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen:
Enriching Intrusion Alerts Through Multi-Host Causality. NDSS 2005 - [c5]Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen:
Detecting past and present intrusions through vulnerability-specific predicates. SOSP 2005: 91-104 - [c4]Samuel T. King, George W. Dunlap, Peter M. Chen:
Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!). USENIX ATC, General Track 2005: 1-15 - 2003
- [c3]Samuel T. King, Peter M. Chen:
Backtracking intrusions. SOSP 2003: 223-236 - [c2]Samuel T. King, George W. Dunlap, Peter M. Chen:
Operating System Support for Virtual Machines. USENIX ATC, General Track 2003: 71-84 - 2002
- [c1]George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen:
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. OSDI 2002
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint