279:, which introduced a novel hashing technique that allowed network operators to monitor network traffic and uncover data patterns that were "propagating", spreading across the network at an unusual rate. Propagating traffic is a strong indicator for network worm outbreaks, a key unsolved problem in
201:, rather than as a theoretical design implication. That same year, Savage published "Sting", a paper and software tool that presented a mechanism to abuse quirks in the TCP protocol to allow a single party to infer bidirectional packet loss, a valuable contribution to
220:
that would enable them to trace floods of traffic back to their origin. IP traceback is a major open networking research question, with significant implications towards DDOS mitigation: if IP traffic can be traced,
267:
in an academic setting; Bellardo and Savage reverse engineered the
Intersil wireless chipset, finding an undocumented diagnostic mode that allowed them to directly inject malicious wireless packets onto a network.
312:
for "innovative research in network security, privacy, and reliability that has taught us to view attacks and attackers as elements of an integrated technological, societal, and economic system."
197:, allowing attackers to monopolize crowded network connections that would otherwise be shared by multiple users. This was the first paper to address congestion control evasion as a
683:
653:
324:
693:
263:
wireless protocol flaws that would allow attackers to force legitimate clients off wireless networks. The paper is also a notable example of applied
287:
479:
668:
663:
698:
658:
352:
225:
can track down and halt DDOS floods. Savage later co-founded Asta
Networks, which offered a product that addressed these problems.
643:
320:
648:
298:
142:
122:
240:
and provided major empirical results regarding DDOS attacks. Follow-on work has provided insight into the spread of
458:
145:. There, he holds the Irwin and Joan Jacobs Chair in Information and Computer Science. Savage is widely cited in
332:
290:
and Stefan Savage developed
Syncscan algorithm that cuts the time needed to switch between Wi-Fi access points.
190:
193:
that carries most
Internet traffic. By exploiting these flaws, Savage proposed means for attackers to evade
194:
202:
688:
85:
294:
283:. Varghese later co-founded Netsift to capitalize on this research; Cisco purchased Netsift in 2005.
222:
198:
302:
174:
97:
483:
673:
309:
480:"ACM Names 41 Fellows from World's Leading Institutions — Association for Computing Machinery"
590:
678:
316:
102:
8:
264:
90:
428:
328:
166:
526:
412:
319:
Fellow (the "genius grant") for his body of work. Savage was elected a Fellow of the
237:
146:
440:
280:
138:
272:
217:
170:
394:
371:
608:
568:
257:
802.11 Denial-of-Service
Attacks: Real Vulnerabilities and Practical Solutions
162:
637:
241:
154:
141:
researcher, currently a
Professor in the Systems and Networking Group at the
249:
245:
544:
213:
150:
504:
628:
413:"Inside the slammer worm - Security & Privacy Magazine, IEEE"
158:
260:
169:
and wireless security. He received his undergraduate degree at
65:
Irwin and Joan Jacobs Chair in
Information and Computer Science
229:
353:"Cybersecurity Expert Named to Irwin and Joan Jacobs Chair"
684:
2010 fellows of the
Association for Computing Machinery
569:"Stefan Savage | American Academy of Arts and Sciences"
429:
http://www.cs.ucsd.edu/~savage/papers/UsenixSec03.pdf
325:
187:TCP Congestion Control with a Misbehaving Receiver
635:
16:American computer science researcher (born 1969)
331:the same year. In 2022, he was elected to the
234:Inferring Internet Denial-of-Service Activity
228:In 2001, Savage, with colleagues at UCSD and
255:In 2003, John Bellardo and Savage published
654:University of California, San Diego faculty
323:in 2021 and was named a recipient of the
210:Practical Network Support for IP Traceback
185:In 1999, Savage's research team published
694:Recipients of the ACM Prize in Computing
259:, which introduced practical attacks on
189:, which uncovered protocol flaws in the
571:. American Academy of Arts and Sciences
369:
297:, in 2010 he was named a Fellow of the
636:
389:
387:
385:
350:
459:"Sloan Foundation 2004 Annual Report"
321:American Academy of Arts and Sciences
561:
382:
299:Association for Computing Machinery
275:led a research team that published
236:, which introduced the idea of the
143:University of California, San Diego
123:University of California, San Diego
13:
14:
710:
669:Hunter College High School alumni
664:Carnegie Mellon University alumni
629:Stefan Savage's home page at UCSD
622:
301:and in 2013, he received the ACM
208:In 2000, Savage's team published
165:(DDOS) mitigation and traceback,
699:Scientists from New York (state)
591:"2021: The Fast and The Curious"
372:"People to watch: Stefan Savage"
659:University of Washington alumni
601:
583:
537:
519:
333:National Academy of Engineering
149:, particularly in the areas of
497:
472:
451:
433:
422:
405:
363:
344:
293:In 2004, Savage was awarded a
1:
370:Bigelow, Bruce (2005-04-15).
338:
277:Automated Worm Fingerprinting
163:distributed denial of service
644:American computer scientists
7:
649:Computer security academics
351:Ramsey, Doug (2016-06-16).
137:(born 1969) is an American
32:1969 (age 54–55)
10:
715:
223:Internet Service Providers
212:, which proposed a simple
86:Carnegie Mellon University
308:In 2015, he received the
295:Sloan Research Fellowship
180:
128:
118:
113:
78:
73:
69:
61:
44:
36:
28:
21:
595:www.goldengooseaward.org
315:In 2017, he was named a
303:SIGOPS Mark Weiser Award
175:University of Washington
98:University of Washington
505:"The Mark Weiser Award"
376:San Diego Union-Tribune
173:and his Ph.D. from the
310:ACM Prize in Computing
597:. 22 September 2021.
549:MacArthur Foundation
445:citeseer.ist.psu.edu
399:citeseer.ist.psu.edu
317:MacArthur Foundation
271:In 2004, Savage and
609:"Dr. Stefan Savage"
265:reverse engineering
203:traffic measurement
74:Academic background
329:Golden Goose Award
195:congestion control
167:automotive hacking
51:Computer scientist
689:MacArthur Fellows
357:ucsdnews.ucsd.edu
238:network telescope
147:computer security
132:
131:
706:
617:
616:
605:
599:
598:
587:
581:
580:
578:
576:
565:
559:
558:
556:
555:
541:
535:
534:
523:
517:
516:
514:
512:
501:
495:
494:
492:
491:
482:. Archived from
476:
470:
469:
463:
455:
449:
448:
437:
431:
426:
420:
419:
417:
409:
403:
402:
391:
380:
379:
367:
361:
360:
348:
281:network security
218:internet routers
139:computer science
106:
94:
19:
18:
714:
713:
709:
708:
707:
705:
704:
703:
634:
633:
625:
620:
607:
606:
602:
589:
588:
584:
574:
572:
567:
566:
562:
553:
551:
545:"Stefan Savage"
543:
542:
538:
527:"Stefan Savage"
525:
524:
520:
510:
508:
503:
502:
498:
489:
487:
478:
477:
473:
461:
457:
456:
452:
439:
438:
434:
427:
423:
415:
411:
410:
406:
393:
392:
383:
368:
364:
349:
345:
341:
273:George Varghese
183:
171:Carnegie Mellon
109:
100:
88:
57:
24:
17:
12:
11:
5:
712:
702:
701:
696:
691:
686:
681:
676:
671:
666:
661:
656:
651:
646:
632:
631:
624:
623:External links
621:
619:
618:
600:
582:
560:
536:
531:awards.acm.org
518:
496:
471:
450:
432:
421:
404:
381:
362:
342:
340:
337:
327:-administered
182:
179:
130:
129:
126:
125:
120:
116:
115:
111:
110:
108:
107:
95:
82:
80:
76:
75:
71:
70:
67:
66:
63:
59:
58:
56:
55:
52:
48:
46:
42:
41:
38:
34:
33:
30:
26:
25:
22:
15:
9:
6:
4:
3:
2:
711:
700:
697:
695:
692:
690:
687:
685:
682:
680:
677:
675:
674:Living people
672:
670:
667:
665:
662:
660:
657:
655:
652:
650:
647:
645:
642:
641:
639:
630:
627:
626:
614:
610:
604:
596:
592:
586:
570:
564:
550:
546:
540:
532:
528:
522:
506:
500:
486:on 2012-04-28
485:
481:
475:
467:
460:
454:
446:
442:
436:
430:
425:
414:
408:
400:
396:
390:
388:
386:
377:
373:
366:
358:
354:
347:
343:
336:
334:
330:
326:
322:
318:
313:
311:
306:
304:
300:
296:
291:
289:
288:Ishwar Ramani
284:
282:
278:
274:
269:
266:
262:
258:
253:
251:
247:
243:
242:network worms
239:
235:
231:
226:
224:
219:
216:extension to
215:
211:
206:
204:
200:
199:vulnerability
196:
192:
188:
178:
176:
172:
168:
164:
161:propagation,
160:
156:
155:network worms
152:
148:
144:
140:
136:
135:Stefan Savage
127:
124:
121:
117:
114:Academic work
112:
104:
99:
96:
92:
87:
84:
83:
81:
77:
72:
68:
64:
60:
53:
50:
49:
47:
43:
39:
35:
31:
27:
23:Stefan Savage
20:
612:
603:
594:
585:
573:. Retrieved
563:
552:. Retrieved
548:
539:
530:
521:
509:. Retrieved
507:. ACM SIGOPS
499:
488:. Retrieved
484:the original
474:
465:
453:
444:
435:
424:
407:
398:
375:
365:
356:
346:
314:
307:
292:
285:
276:
270:
256:
254:
244:, including
233:
232:, published
227:
209:
207:
191:TCP protocol
186:
184:
134:
133:
119:Institutions
679:1969 births
613:www.nae.org
441:"CiteSeerX"
395:"CiteSeerX"
250:SQL Slammer
246:Code Red II
45:Occupations
37:Nationality
638:Categories
554:2020-05-23
490:2011-11-20
339:References
214:stochastic
151:email spam
575:22 August
466:sloan.org
286:In 2005,
79:Education
54:professor
177:(2002).
40:American
159:malware
511:5 July
261:802.11
181:Career
462:(PDF)
416:(PDF)
230:CAIDA
103:Ph.D.
62:Title
577:2011
513:2019
248:and
157:and
91:B.S.
29:Born
640::
611:.
593:.
547:.
529:.
464:.
443:.
397:.
384:^
374:.
355:.
335:.
305:.
252:.
205:.
153:,
615:.
579:.
557:.
533:.
515:.
493:.
468:.
447:.
418:.
401:.
378:.
359:.
105:)
101:(
93:)
89:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.