Chad Verbowski
Chad Verbowski
University of Edinburgh
Verified email at
Cited by
Cited by
SubVirt: Implementing malware with virtual machines
ST King, PM Chen
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-327, 2006
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
YM Wang
13th Annual Network and Distributed System Security Symposium (NDSS), 2006, 2006
Cybersquatter patrol
YM Wang, D Beck, C Verbowski, B Daniels, M Ma
US Patent 7,756,987, 2010
Detecting stealth software with strider ghostbuster
YM Wang, D Beck, B Vo, R Roussev, C Verbowski
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
State based configuration failure detection using checkpoint comparison
C Verbowski, YM Wang
US Patent App. 10/464,118, 2004
Strider: A black-box, state-based approach to change and configuration management and support
YM Wang, C Verbowski, J Dunagan, Y Chen, HJ Wang, C Yuan, Z Zhang
Science of Computer Programming 53 (2), 143-164, 2004
Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.
YM Wang, D Beck, J Wang, C Verbowski, B Daniels
SRUTI 6 (31-36), 2-2, 2006
Fingerprinting event logs for system management troubleshooting
R Panigrahy, C Verbowski, Y Xie, J Yang, D Yuan
US Patent 8,069,374, 2011
Summary-based routing for content-based event distribution networks
YM Wang, L Qiu, CE Verbowski, D Achlioptas, G Das, PA Larson
US Patent 7,200,675, 2007
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
YM Wang, R Roussev, C Verbowski, A Johnson, MW Wu, Y Huang, ...
LISA 4, 33-46, 2004
Changed file identification, software conflict resolution and unwanted file removal
YM Wang, AR Johnson, DC Ladd, RA Roussev, CE Verbowski
US Patent 7,765,592, 2010
Context-based online configuration-error detection
D Yuan, Y Xie, R Panigrahy, J Yang, C Verbowski, A Kumar
Proceedings of the 2011 USENIX conference on USENIX annual technical …, 2011
Flight data recorder: Monitoring persistent-state interactions to improve systems management
C Verbowski, E Kiciman, A Kumar, B Daniels, S Lu, J Lee, YM Wang, ...
Proceedings of the 7th symposium on Operating systems design and …, 2006
Method and system for detecting infection of an operating system
DR Beck, AR Johnson, RA Roussev, CE Verbowski, BD Vo, YM Wang
US Patent 7,627,898, 2009
Managing spyware and unwanted software through auto-start extensibility points
YM Wang, C Verbowski, A Johnson, R Roussev
US Patent App. 10/952,336, 2005
Isolation environment-based information access
JR Lorch, YM Wang, C Verbowski, HJ Wang, S King
US Patent 8,024,815, 2011
Method and system for analyzing the impact of a software update
BR Daniels, J Dunagan, RA Roussev, CE Verbowski, YM Wang
US Patent 7,614,046, 2009
Thread interception and analysis
C Verbowski, B Daniels, J Dunagan, S Lu, R Roussev, J Lee, A Kumar
US Patent 7,716,530, 2010
Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
CE Verbowski, JH Wang, JC Platt, R Zhang, Y Chen
US Patent 7,584,382, 2009
Towards a self-managing software patching process using black-box persistent-state manifests
J Dunagan, R Roussev, B Daniels, A Johnson, C Verbowski, YM Wang
International Conference on Autonomic Computing, 2004. Proceedings., 106-113, 2004
The system can't perform the operation now. Try again later.
Articles 1–20