Sam King

Computer Science @ UC Davis

Matthew Hicks, Cynthia Sturton, Samuel T. King and Jonathan M. Smith, "SPECS: A lightweight runtime mechanism for protecting software from security-critical processor bugs. Proceedings of the Symposium on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2015.

G. Pokam, K. Danne, C. Pereira, R. Kassa, T. Kranich, S. Hu, J. Gottschlich, N. Honarmand, N. Dautenhahn, S.T. King and J. Torrellas, "QuickRec: Prototyping an Intel Architecture Extension for Record and Replay of Multithreaded Programs. Proceedings of International Symposium on Computer Architecture (ISCA), June 2013.

N. Honarmand, N. Dautenhahn, J. Torrellas, S.T. King, G. Pokam and C. Pereira, "Cyrus: Unintrusive Application-Level Record-Replay for Replay Parallelism. Proceedings of the Symposium on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2013.

Haohui Mai, Edgar Pek, Hui Xue, Samuel T. King, and P. Madhusudan, "Verifying Security Invariants in ExpressOS. Proceedings of the Symposium on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2013.

Ralf Sasse, Samuel T. King, Jose Meseguer, and Shuo Tang, "IBOS: A Correct-By-Construction Modular Browser. Proceedings of the International Symposium on Formal Aspects of Component Software (FACS), Mountain View, CA, September 2012.

Haohui Mai, Shuo Tang, Samuel T. King, Calin Cascaval, and Pablo Montesinos, "A Case for Parallelizing Web Pages. Proceedings of 4th USENIX Workshop on Hot Topics in Parallelism (HotPar 2012), Berkeley, CA, Jun 2012.

Hui Xue, Nathan Dautenhahn, and Samuel T. King, "Using Replicated Execution for a More Secure and Reliable Web Browser. Proceedings of the 2012 Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2012.

Shuo Tang, Nathan Dautenhahn, and Samuel T. King, "Fortifying Web-Based Applications Automatically. Proceedings of 18th ACM Conference on Computer and Communications Security (CCS 2011), Chicago, IL, October 2011.

Murph Finnicum, Samuel T. King, "Building Secure Robot Applications. Proceedings of the 2011 Usenix Workshop on Hot Topics in Security (HotSec), August 2011.

Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey, and Samuel T. King, "Debugging the Data Plane with Anteater. Proceedings of the 2011 ACM SIGCOMM Conference, August 2011.

Cynthia Sturton, Matthew Hicks, David Wagner, Samuel T. King, "Defeating UCI: Building Stealthy and Malicious Hardware. Proceedings of the 2011 IEEE Symposium on Security and Privacy (Oakland), May 2011.

Anthony Cozzie, Murph Finnicum, and Samuel T. King, "Macho: Programming with Man Pages. Proceedings of the 2011 Workshop on Hot Topics in Operating Systems (HotOS), May 2011.

Shuo Tang, Haohui Mai, and Samuel T. King, "Trust and Protection in the Illinois Browser Operating System. Proceedings of the 2010 Symposium on Operating Systems Design and Implementation (OSDI), October 2010.

Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett, "VEX: Vetting Browser Extensions For Security Vulnerabilities. Proceedings of the 2010 USENIX Security Symposium, August 2010. Best paper award.

Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, and Jonathan M. Smith, "Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. Proceedings of the 2010 IEEE Symposium on Security and Privacy (Oakland), May 2010.

Shuo Tang, Chris Grier, Onur Aciicmez, and Samuel T. King, "Alhambra: A System for Creating, Enforcing, and Testing Browser Security Policies. Proceedings of the 2010 International World Wide Web Conference (WWW), April 2010.

Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha Godiyal, Samuel T. King, and Hai D. Nguyen, "MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. Proceedings of the 2009 Annual Computer Security Applications Conference (ACSAC), December 2009.

Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudary, and Herman Venter, "The Multi-Principal OS Construction of the Gazelle Web Browser. Proceedings of the 2009 Usenix Security Symposium, August 2009.

Pablo Montesinos, Matthew Hicks, Wonsun Ahn, Samuel T. King, and Josep Torrellas, "Lessons Learned During the Development of the CapoOne Deterministic Multiprocessor Replay System. Proceedings of the 2009 Workshop on the Interaction Between Operating Systems and Computer Architecture (WIOSCA), June 2009.

Chris Grier, Samuel T. King, and Dan Wallach, "How I Learned To Stop Worrying and Love Plugins. Proceedings of the 2009 Workshop on Web 2.0 Security and Privacy (W2SP), May 2009.

Pablo Montesinos, Matthew Hicks, Samuel T. King, and Josep Torrellas, "Capo: a Software-Hardware Interface for Practical Deterministic Multiprocessor Replay. Proceedings of the 2009 Symposium on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2009.

Andrew Lenharth, Vikram Adve, and Samuel T. King, "Recovery Domains: An Organizing Principle for Recoverable Operating Systems. Proceedings of the 2009 Symposium on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2009.

Anthony Cozzie, Frank Stratton, Hui Xue, and Samuel T. King, "Digging for Data Structures. Proceedings of the 2008 Symposium on Operating Systems Design and Implementation (OSDI), December 2008.

Chris Grier, Shuo Tang, and Samuel T. King, "Secure web browsing with the OP web browser. Proceedings of the 2008 IEEE Symposium on Security and Privacy (Oakland), May 2008.

Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou, "Designing and implementing malicious hardware. Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2008. Best paper award.

Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, and Jacob R. Lorch, "SubVirt: Implementing malware with virtual machines. Proceedings of the 2006 IEEE Symposium on Security and Privacy (Oakland), May 2006.

Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev,Chad Verbowski, Shuo Chen, and Sam King, "Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS), February 2006

Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen, "Detecting past and present intrusions through vulnerability-specific predicates. Proceedings of the 2005 Symposium on Operating Systems Principles (SOSP), October 2005.

Samuel T. King, Peter M. Chen, "Backtracking Intrusions. ACM Transactions on Computer Systems, February 2005. This is the journal version of our SOSP 2003 paper.

Samuel T. King, George W. Dunlap, Peter M. Chen, "Debugging operating systems with time-traveling virtual machines. Proceedings of the 2005 Annual USENIX Technical Conference , April 2005. Best paper award.

Samuel T. King, Z. Morley Mao, Dominic G. Lucchetti, and Peter M. Chen, "Enriching intrusion alerts through multi-host causality. Proceedings of the 2005 Network and Distributed System Security Symposium (NDSS), February 2005.

Samuel T. King, Peter M. Chen, "Backtracking Intrusions. Proceedings of the 2003 Symposium on Operating Systems Principles (SOSP), October 2003. Award paper.

Samuel T. King, George W. Dunlap, Peter M. Chen, "Operating System Support for Virtual Machines. Proceedings of the 2003 Annual USENIX Technical Conference, June 2003.

George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza Basrai, Peter M. Chen, "ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI), December 2002.