Samuel T. King
Orcid: 0000-0002-7890-6051
According to our database1,
Samuel T. King
authored at least 47 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
2023
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
2019
IEEE Micro, 2019
2018
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018
2015
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2013
QuickRec: prototyping an intel architecture extension for record and replay of multithreaded programs.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013
2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism, 2012
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012
2011
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
login Usenix Mag., 2010
Proceedings of the 19th International Conference on World Wide Web, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
2009
Proceedings of the 18th USENIX Security Symposium, 2009
Capo: a software-hardware interface for practical deterministic multiprocessor replay.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2006
2005
Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!).
Proceedings of the 2005 USENIX Annual Technical Conference, 2005
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
2003
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003
2002
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002