Chad Verbowski

According to our database1, Chad Verbowski authored at least 18 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Right-Sizing Server Capacity Headroom for Global Online Services.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2011
Context-based Online Configuration-Error Detection.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

2007
The Secret Lives of Computers Exposed: Flight Data Recorder for Windows.
login Usenix Mag., 2007

2006
Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006

SubVirt: Implementing malware with virtual machines.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Analyzing persistent state interactions to improve state management.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2006

LiveOps: Systems Management as a Service.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

System Administration: Drowning in Management Complexity.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

2005
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities.
Proceedings of the Network and Distributed System Security Symposium, 2005

Detecting Stealth Software with Strider GhostBuster.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Strider: a black-box, state-based approach to change and configuration management and support.
Sci. Comput. Program., 2004

Summary-based routing for content-based event distribution networks.
Comput. Commun. Rev., 2004

Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004

2003
Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003


  Loading...