Chad Verbowski
Chad Verbowski
University of Edinburgh
Verified email at verbowski.com
Title
Cited by
Cited by
Year
SubVirt: Implementing malware with virtual machines
ST King, PM Chen
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-327, 2006
6262006
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
YM Wang, D Beck, X Jiang, R Roussev
IN NDSS, 2006
562*2006
Detecting stealth software with strider ghostbuster
YM Wang, D Beck, B Vo, R Roussev, C Verbowski
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
2592005
Strider: A black-box, state-based approach to change and configuration management and support
YM Wang, C Verbowski, J Dunagan, Y Chen, HJ Wang, C Yuan, Z Zhang
Science of Computer Programming 53 (2), 143-164, 2004
2262004
State based configuration failure detection using checkpoint comparison
C Verbowski, YM Wang
US Patent App. 10/464,118, 2004
2122004
Cybersquatter patrol
YM Wang, D Beck, C Verbowski, B Daniels, M Ma
US Patent 7,756,987, 2010
1562010
Summary-based routing for content-based event distribution networks
YM Wang, L Qiu, CE Verbowski, D Achlioptas, G Das, PA Larson
US Patent 7,200,675, 2007
1212007
Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.
YM Wang, D Beck, J Wang, C Verbowski, B Daniels
SRUTI 6 (31-36), 2.2-2.3, 2006
1072006
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
YM Wang, R Roussev, C Verbowski, A Johnson, MW Wu, Y Huang, ...
LISA 4, 33-46, 2004
1032004
Changed file identification, software conflict resolution and unwanted file removal
YM Wang, AR Johnson, DC Ladd, RA Roussev, CE Verbowski
US Patent 7,765,592, 2010
962010
Fingerprinting event logs for system management troubleshooting
R Panigrahy, C Verbowski, Y Xie, J Yang, D Yuan
US Patent 8,069,374, 2011
912011
Flight data recorder: monitoring persistent-state interactions to improve systems management
C Verbowski, E Kiciman, A Kumar, B Daniels, S Lu, J Lee, YM Wang, ...
Proceedings of the 7th symposium on Operating systems design and …, 2006
812006
Method and system for detecting infection of an operating system
DR Beck, AR Johnson, RA Roussev, CE Verbowski, BD Vo, YM Wang
US Patent 7,627,898, 2009
802009
Isolation environment-based information access
JR Lorch, YM Wang, C Verbowski, HJ Wang, S King
US Patent 8,024,815, 2011
712011
Context-based online configuration-error detection
D Yuan, Y Xie, R Panigrahy, J Yang, C Verbowski, A Kumar
Proceedings of the 2011 USENIX conference on USENIX annual technical …, 2011
672011
Managing spyware and unwanted software through auto-start extensibility points
YM Wang, C Verbowski, A Johnson, R Roussev
US Patent App. 10/952,336, 2005
672005
Method and system for analyzing the impact of a software update
BR Daniels, J Dunagan, RA Roussev, CE Verbowski, YM Wang
US Patent 7,614,046, 2009
632009
Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
CE Verbowski, JH Wang, JC Platt, R Zhang, Y Chen
US Patent 7,584,382, 2009
542009
Towards a self-managing software patching process using black-box persistent-state manifests
J Dunagan, R Roussev, B Daniels, A Johnson, C Verbowski, YM Wang
International Conference on Autonomic Computing, 2004. Proceedings., 106-113, 2004
522004
Online service monitoring
J Lee, J Dunagan, A Wolman, C Verbowski, S Lovett
US Patent App. 11/194,891, 2007
502007
The system can't perform the operation now. Try again later.
Articles 1–20