Knowledge

Stefan Savage

Source 📝

279:, which introduced a novel hashing technique that allowed network operators to monitor network traffic and uncover data patterns that were "propagating", spreading across the network at an unusual rate. Propagating traffic is a strong indicator for network worm outbreaks, a key unsolved problem in 201:, rather than as a theoretical design implication. That same year, Savage published "Sting", a paper and software tool that presented a mechanism to abuse quirks in the TCP protocol to allow a single party to infer bidirectional packet loss, a valuable contribution to 220:
that would enable them to trace floods of traffic back to their origin. IP traceback is a major open networking research question, with significant implications towards DDOS mitigation: if IP traffic can be traced,
267:
in an academic setting; Bellardo and Savage reverse engineered the Intersil wireless chipset, finding an undocumented diagnostic mode that allowed them to directly inject malicious wireless packets onto a network.
312:
for "innovative research in network security, privacy, and reliability that has taught us to view attacks and attackers as elements of an integrated technological, societal, and economic system."
197:, allowing attackers to monopolize crowded network connections that would otherwise be shared by multiple users. This was the first paper to address congestion control evasion as a 683: 653: 324: 693: 263:
wireless protocol flaws that would allow attackers to force legitimate clients off wireless networks. The paper is also a notable example of applied
287: 479: 668: 663: 698: 658: 352: 225:
can track down and halt DDOS floods. Savage later co-founded Asta Networks, which offered a product that addressed these problems.
643: 320: 648: 298: 142: 122: 240:
and provided major empirical results regarding DDOS attacks. Follow-on work has provided insight into the spread of
458: 145:. There, he holds the Irwin and Joan Jacobs Chair in Information and Computer Science. Savage is widely cited in 332: 290:
and Stefan Savage developed Syncscan algorithm that cuts the time needed to switch between Wi-Fi access points.
190: 193:
that carries most Internet traffic. By exploiting these flaws, Savage proposed means for attackers to evade
194: 202: 688: 85: 294: 283:. Varghese later co-founded Netsift to capitalize on this research; Cisco purchased Netsift in 2005. 222: 198: 302: 174: 97: 483: 673: 309: 480:"ACM Names 41 Fellows from World's Leading Institutions — Association for Computing Machinery" 590: 678: 316: 102: 8: 264: 90: 428: 328: 166: 526: 412: 319:
Fellow (the "genius grant") for his body of work. Savage was elected a Fellow of the
237: 146: 440: 280: 138: 272: 217: 170: 394: 371: 608: 568: 257:
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
162: 637: 241: 154: 141:
researcher, currently a Professor in the Systems and Networking Group at the
249: 245: 544: 213: 150: 504: 628: 413:"Inside the slammer worm - Security & Privacy Magazine, IEEE" 158: 260: 169:
and wireless security. He received his undergraduate degree at
65:
Irwin and Joan Jacobs Chair in Information and Computer Science
229: 353:"Cybersecurity Expert Named to Irwin and Joan Jacobs Chair" 684:
2010 fellows of the Association for Computing Machinery
569:"Stefan Savage | American Academy of Arts and Sciences" 429:
http://www.cs.ucsd.edu/~savage/papers/UsenixSec03.pdf
325:
American Association for the Advancement of Science
187:TCP Congestion Control with a Misbehaving Receiver 635: 16:American computer science researcher (born 1969) 331:the same year. In 2022, he was elected to the 234:Inferring Internet Denial-of-Service Activity 228:In 2001, Savage, with colleagues at UCSD and 255:In 2003, John Bellardo and Savage published 654:University of California, San Diego faculty 323:in 2021 and was named a recipient of the 210:Practical Network Support for IP Traceback 185:In 1999, Savage's research team published 694:Recipients of the ACM Prize in Computing 259:, which introduced practical attacks on 189:, which uncovered protocol flaws in the 571:. American Academy of Arts and Sciences 369: 297:, in 2010 he was named a Fellow of the 636: 389: 387: 385: 350: 459:"Sloan Foundation 2004 Annual Report" 321:American Academy of Arts and Sciences 561: 382: 299:Association for Computing Machinery 275:led a research team that published 236:, which introduced the idea of the 143:University of California, San Diego 123:University of California, San Diego 13: 14: 710: 669:Hunter College High School alumni 664:Carnegie Mellon University alumni 629:Stefan Savage's home page at UCSD 622: 301:and in 2013, he received the ACM 208:In 2000, Savage's team published 165:(DDOS) mitigation and traceback, 699:Scientists from New York (state) 591:"2021: The Fast and The Curious" 372:"People to watch: Stefan Savage" 659:University of Washington alumni 601: 583: 537: 519: 333:National Academy of Engineering 149:, particularly in the areas of 497: 472: 451: 433: 422: 405: 363: 344: 293:In 2004, Savage was awarded a 1: 370:Bigelow, Bruce (2005-04-15). 338: 277:Automated Worm Fingerprinting 163:distributed denial of service 644:American computer scientists 7: 649:Computer security academics 351:Ramsey, Doug (2016-06-16). 137:(born 1969) is an American 32:1969 (age 54–55) 10: 715: 223:Internet Service Providers 212:, which proposed a simple 86:Carnegie Mellon University 308:In 2015, he received the 295:Sloan Research Fellowship 180: 128: 118: 113: 78: 73: 69: 61: 44: 36: 28: 21: 595:www.goldengooseaward.org 315:In 2017, he was named a 303:SIGOPS Mark Weiser Award 175:University of Washington 98:University of Washington 505:"The Mark Weiser Award" 376:San Diego Union-Tribune 173:and his Ph.D. from the 310:ACM Prize in Computing 597:. 22 September 2021. 549:MacArthur Foundation 445:citeseer.ist.psu.edu 399:citeseer.ist.psu.edu 317:MacArthur Foundation 271:In 2004, Savage and 609:"Dr. Stefan Savage" 265:reverse engineering 203:traffic measurement 74:Academic background 329:Golden Goose Award 195:congestion control 167:automotive hacking 51:Computer scientist 689:MacArthur Fellows 357:ucsdnews.ucsd.edu 238:network telescope 147:computer security 132: 131: 706: 617: 616: 605: 599: 598: 587: 581: 580: 578: 576: 565: 559: 558: 556: 555: 541: 535: 534: 523: 517: 516: 514: 512: 501: 495: 494: 492: 491: 482:. Archived from 476: 470: 469: 463: 455: 449: 448: 437: 431: 426: 420: 419: 417: 409: 403: 402: 391: 380: 379: 367: 361: 360: 348: 281:network security 218:internet routers 139:computer science 106: 94: 19: 18: 714: 713: 709: 708: 707: 705: 704: 703: 634: 633: 625: 620: 607: 606: 602: 589: 588: 584: 574: 572: 567: 566: 562: 553: 551: 545:"Stefan Savage" 543: 542: 538: 527:"Stefan Savage" 525: 524: 520: 510: 508: 503: 502: 498: 489: 487: 478: 477: 473: 461: 457: 456: 452: 439: 438: 434: 427: 423: 415: 411: 410: 406: 393: 392: 383: 368: 364: 349: 345: 341: 273:George Varghese 183: 171:Carnegie Mellon 109: 100: 88: 57: 24: 17: 12: 11: 5: 712: 702: 701: 696: 691: 686: 681: 676: 671: 666: 661: 656: 651: 646: 632: 631: 624: 623:External links 621: 619: 618: 600: 582: 560: 536: 531:awards.acm.org 518: 496: 471: 450: 432: 421: 404: 381: 362: 342: 340: 337: 327:-administered 182: 179: 130: 129: 126: 125: 120: 116: 115: 111: 110: 108: 107: 95: 82: 80: 76: 75: 71: 70: 67: 66: 63: 59: 58: 56: 55: 52: 48: 46: 42: 41: 38: 34: 33: 30: 26: 25: 22: 15: 9: 6: 4: 3: 2: 711: 700: 697: 695: 692: 690: 687: 685: 682: 680: 677: 675: 674:Living people 672: 670: 667: 665: 662: 660: 657: 655: 652: 650: 647: 645: 642: 641: 639: 630: 627: 626: 614: 610: 604: 596: 592: 586: 570: 564: 550: 546: 540: 532: 528: 522: 506: 500: 486:on 2012-04-28 485: 481: 475: 467: 460: 454: 446: 442: 436: 430: 425: 414: 408: 400: 396: 390: 388: 386: 377: 373: 366: 358: 354: 347: 343: 336: 334: 330: 326: 322: 318: 313: 311: 306: 304: 300: 296: 291: 289: 288:Ishwar Ramani 284: 282: 278: 274: 269: 266: 262: 258: 253: 251: 247: 243: 242:network worms 239: 235: 231: 226: 224: 219: 216:extension to 215: 211: 206: 204: 200: 199:vulnerability 196: 192: 188: 178: 176: 172: 168: 164: 161:propagation, 160: 156: 155:network worms 152: 148: 144: 140: 136: 135:Stefan Savage 127: 124: 121: 117: 114:Academic work 112: 104: 99: 96: 92: 87: 84: 83: 81: 77: 72: 68: 64: 60: 53: 50: 49: 47: 43: 39: 35: 31: 27: 23:Stefan Savage 20: 612: 603: 594: 585: 573:. Retrieved 563: 552:. Retrieved 548: 539: 530: 521: 509:. Retrieved 507:. ACM SIGOPS 499: 488:. Retrieved 484:the original 474: 465: 453: 444: 435: 424: 407: 398: 375: 365: 356: 346: 314: 307: 292: 285: 276: 270: 256: 254: 244:, including 233: 232:, published 227: 209: 207: 191:TCP protocol 186: 184: 134: 133: 119:Institutions 679:1969 births 613:www.nae.org 441:"CiteSeerX" 395:"CiteSeerX" 250:SQL Slammer 246:Code Red II 45:Occupations 37:Nationality 638:Categories 554:2020-05-23 490:2011-11-20 339:References 214:stochastic 151:email spam 575:22 August 466:sloan.org 286:In 2005, 79:Education 54:professor 177:(2002). 40:American 159:malware 511:5 July 261:802.11 181:Career 462:(PDF) 416:(PDF) 230:CAIDA 103:Ph.D. 62:Title 577:2011 513:2019 248:and 157:and 91:B.S. 29:Born 640:: 611:. 593:. 547:. 529:. 464:. 443:. 397:. 384:^ 374:. 355:. 335:. 305:. 252:. 205:. 153:, 615:. 579:. 557:. 533:. 515:. 493:. 468:. 447:. 418:. 401:. 378:. 359:. 105:) 101:( 93:) 89:(

Index

Carnegie Mellon University
B.S.
University of Washington
Ph.D.
University of California, San Diego
computer science
University of California, San Diego
computer security
email spam
network worms
malware
distributed denial of service
automotive hacking
Carnegie Mellon
University of Washington
TCP protocol
congestion control
vulnerability
traffic measurement
stochastic
internet routers
Internet Service Providers
CAIDA
network telescope
network worms
Code Red II
SQL Slammer
802.11
reverse engineering
George Varghese

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.