Samuel T. King

Orcid: 0000-0002-7890-6051

According to our database1, Samuel T. King authored at least 45 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security, extensibility, and redundancy in the Metabolic Operating System.
CoRR, 2024

2023
Aragorn: A Privacy-Enhancing System for Mobile Cameras.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

Centauri: Practical Rowhammer Fingerprinting.
CoRR, 2023

2021
Credit Card Fraud Is a Computer Security Problem.
IEEE Secur. Priv., 2021

Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Boxer: Preventing fraud by scanning credit cards.
Proceedings of the 29th USENIX Security Symposium, 2020

PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

2019
FinalFilter: Asserting Security Properties of a Processor at Runtime.
IEEE Micro, 2019

2018
A case for exposing extra-architectural state in the ISA: position paper.
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018

2015
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2013
QuickRec: prototyping an intel architecture extension for record and replay of multithreaded programs.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013

Verifying security invariants in ExpressOS.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013

Cyrus: unintrusive application-level record-replay for replay parallelism.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013

2012
Using replicated execution for a more secure and reliable web browser.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A Case for Parallelizing Web Pages.
Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism, 2012

IBOS: A Correct-By-Construction Modular Browser.
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012

2011
Designing and Implementing the OP and OP2 Web Browsers.
ACM Trans. Web, 2011

Vetting browser extensions for security vulnerabilities with VEX.
Commun. ACM, 2011

Building Secure Robot Applications.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Defeating UCI: Building Stealthy and Malicious Hardware.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Debugging the data plane with anteater.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Macho: Programming with Man Pages.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Fortifying web-based applications automatically.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
login Usenix Mag., 2010

Alhambra: a system for creating, enforcing, and testing browser security policies.
Proceedings of the 19th International Conference on World Wide Web, 2010

VEX: Vetting Browser Extensions for Security Vulnerabilities.
Proceedings of the 19th USENIX Security Symposium, 2010

Trust and Protection in the Illinois Browser Operating System.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

2009
The Multi-Principal OS Construction of the Gazelle Web Browser.
Proceedings of the 18th USENIX Security Symposium, 2009

Capo: a software-hardware interface for practical deterministic multiprocessor replay.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009

Recovery domains: an organizing principle for recoverable operating systems.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009

MAVMM: Lightweight and Purpose Built VMM for Malware Analysis.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Building a More Secure Web Browser.
login Usenix Mag., 2008

Virtualization and Security: Back to the Future.
IEEE Secur. Priv., 2008

Secure Web Browsing with the OP Web Browser.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Digging for Data Structures.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Designing and Implementing Malicious Hardware.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

2006
Analyzing intrusions using operating system level information flow.
PhD thesis, 2006

SubVirt: Implementing malware with virtual machines.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2006

2005
Backtracking intrusions.
ACM Trans. Comput. Syst., 2005

Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!).
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

Detecting past and present intrusions through vulnerability-specific predicates.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

Enriching Intrusion Alerts Through Multi-Host Causality.
Proceedings of the Network and Distributed System Security Symposium, 2005

2003
Operating System Support for Virtual Machines.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

2002
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002


  Loading...