Yi-Min Wang's Curriculum Vitae (Research)

YI-MIN WANG

Managing Director
Microsoft Research Technologies

 

E-mail: ymwang ‘at’ microsoft ‘dot’ com

Home Page: http://research.microsoft.com/~ymwang
Curriculum Vitae: http://research.microsoft.com/~ymwang/vita/vita.htm

 

Work address:
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052
Phone: (425) 706-3467
Fax: (425) 936-7329

Last Updated: October 15, 2014

Areas of Expertise

R&D Management: Machine Learning, Machine Translation, Search Engine, Natural Language Processing, Cybersecurity, Systems Management, Fault Tolerance, Distributed Systems, and Networking.

Technical Leadership in Reliability, Security, and Quality

Education

University of Illinois at Urbana-Champaign, Urbana, IL
Jan. 1990 – Aug. 1993
Ph.D. in Electrical and Computer Engineering (G.P.A. 5.00)

University of Illinois at Urbana-Champaign, Urbana, IL
Aug. 1988 – Jan. 1990
M.S. in Electrical and Computer Engineering (G.P.A. 5.00)

National Taiwan University, Taipei, Taiwan
Aug. 1982 – May 1986
B.S. in Electrical Engineering (Ranked #1 in a class of 168)

Work Experience

Microsoft Research, Redmond, WA 
January 2014 – Present
Managing Director, Microsoft Research Technologies (MSR-T)

Microsoft Research, Redmond, WA
November 2012 – January 2014
Managing Co-Director, Microsoft Research-Redmond

Microsoft Research, Redmond, WA
August 2011– November 2012
Deputy Managing Director, Microsoft Research-Redmond

Microsoft Research, Redmond, WA
July 2009 – July 2011
Director / Principal Researcher, Internet Services Research Center (ISRC)

Microsoft Research, Redmond, WA
July 2007 – June 2009
Director / Principal Researcher, Search Quality & Cyber-Intelligence Lab (SQ-CIL), Internet Services Research Center (ISRC)

Microsoft Research, Redmond, WA
March 2006 – July 2007
Group Manager / Principal Researcher, Systems and Networking Research Area

Microsoft Research, Redmond, WA
May 2005 -- July 2007
Group Manager, Cybersecurity and Systems Management Research Group

Microsoft Research, Redmond, WA
March 2004 – May 2005
Group Manager, Systems Management Research Group

Microsoft Research, Redmond, WA
Sep. 2003 – March 2004
Senior Researcher, Systems and Networking Research Group

Microsoft Research, Redmond, WA
Jan. 1998 – Aug. 2003
Researcher, Systems and Networking Research Group

AT&T Labs, Florham Park, NJ
Jan. 1996 -- Jan. 1998
Principal Technical Staff Member, Distributed Systems

AT&T Bell Laboratories, Murray Hill, NJ
Aug. 1993 -- Jan. 1996
Member of Technical Staff, Reliable Distributed Systems

University of Illinois at Urbana-Champaign, Urbana, IL
Jan. 1990 -- Aug. 1993
Research Assistant, Fault-Tolerant Computing

University of Illinois at Urbana-Champaign, Urbana, IL
Aug. 1988 -- Jan. 1990
Research Assistant, Digital Signal Processing

R.O.C. (Taiwan) Navy, Penghu, Taiwan
Oct. 1986 -- Aug. 1988
Electrical Engineer, Industrial Electronics

Long Shine Electronics, Taipei, Taiwan
Mar. 1986 -- Oct. 1986
Hardware Engineer, PC Graphic Systems Design

Honors and Awards

  • UIUC ECE Distinguished Alumni Award, 2014 - recognized for “contributions to dependable computing and web security, and leadership in industrial research”
  • IEEE Fellow, Class of 2010 - for contributions to Dependable Computing and Web Security
  • Microsoft Early Stock Award, 2006
  • Microsoft Achievement Award, 2005
  • Microsoft Gold Star Award, 2005
  • Microsoft Gold Star Award, 2004
  • Best Paper Award, 17th Usenix Large Installation System Administration (LISA) Conference, 2003.
  • Microsoft Gold Star Award, 2000
  • Information Principles Laboratory Award for the work on CosMiC, 1994
  • Robert T. Chien Memorial Award for excellence in research, Graduate College, University of Illinois at Urbana-Champaign, 1993
  • Best Student Paper Award, 12th IEEE Symposium on Reliable Distributed Systems, 1993
  • Best Presentation Award, Center for Reliable and High-Performance Computing Seminars, 1992
  • Dean's list, National Taiwan University, 1983, 1984, 1985 and 1986

Sponsored Research Award

Invited Talks

  • Keynote Speaker, Security Challenges in An Increasingly Connected World,” IEEE International Symposium on Reliable Distributed Systems (SRDS), September 28, 2009
  • Keynote Speaker, Adversarial Web Crawling with Strider Monkeys,” Microsoft Research Asia · Tsinghua University Workshop on Internet Services and Cloud Computing, November 2008
  • Keynote Speaker, Online Advertising: The Good, The Bad, and The Ugly”, International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2006
  • “Automated Web Patrol with Strider HoneyMonkeys,” National Taiwan University, Taipei, October 27, 2008
  • “Spyware,” Stanford University, California, November 10, 2005
  • “Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities,” University of Illinois, Urbana-Champaign, October 19, 2005
  • “STRIDER: A New Approach to Configuration and Security Management,” UC Berkeley, California, October 28, 2004 and Georgia Tech, Atlanta, Georgia, November 18, 2004
  • “STRIDER: A Computer Genomics Approach to Systems Management and Support,” Stanford University, May 6, 2003

Professional Activities

Journal Editor

Program Chair

Program Committee Members

Other Committees

Patents Issued

Dependability

Home Networking

Distributed Objects

  • “Accelerating a distributed component architecture over a network using a modified RPC communication,” U. S. Patent Number 6,708,223, issued on March 16, 2004.
  • “Accelerating a distributed component architecture over a network using a direct marshaling,” U.S. Patent Number 6,826,763, issued on November 30, 2004.
  • “Method and system for providing reliability and availability in a distributed component object model (DCOM) object oriented system,” U.S. Patent Number 7,082,553, issued on July 25, 2006.
  • “Accelerating a distributed component architecture over a network using a modified RPC communication,” U.S. Patent Number 7,624,398, issued on November 24, 2009

Systems Management

  • “Event-based Automated Diagnosis of Known Problems,” U.S. Patent Number 7,171,337, issued on January 30, 2007.
  • “Method and system for troubleshooting a misconfiguration of a computer system based on product support services information,” U.S. Patent Number 7,389,444, issued on June 17, 2008.
  • “Method and system for collecting information from computer systems based on a trusted relationship,” U.S. Patent Number 7,392,295, issued on June 24, 2008.
  • “Method and system for analyzing the impact of a software update,” U.S. Patent Number 7,614,046, issued on November 3, 2009.
  • “Program modification and loading times in computing devices,” U.S. Patent Number 7,698,305, issued on April 13, 2010.
  • “Changed file identification, software conflict resolution and unwanted file removal,” U.S. Patent Number 7,765,592, issued on July 27, 2010.

Security and Privacy

  • “System and method for protecting privacy and anonymity of parties of network communications,” U.S. Patent Number 6,986,036, issued on January 10, 2006.
  • “System and method for evaluating and enhancing source anonymity for encrypted web traffic,” U.S. Patent Number 7,096,200, issued on August 22, 2006.
  • “Automated rootkit detector,” U.S. Patent Number 7,571,482, issued on August 4, 2009.
  • “Identifying dependencies of an application upon a given security context,” U.S. Patent Number 7,620,995, issued on November 17, 2009 
  • “Method and system for detecting infection of an operating system,” U.S. Patent Number 7,627,898, issued on December 1, 2009 
  • “System and method for evaluating and enhancing source anonymity for encrypted web traffic,” U.S. Patent Number 7,640,215, issued on December 29, 2009
  • “Cybersquatter patrol,” U.S. Patent Number 7,756,987, issued on July 13, 2010
  • “Honey monkey network exploration,” U.S. Patent Number 7,774,459, issued on August 10, 2010
  • “Identifying dependencies of an application upon a given security context,” U.S. Patent Number 7,779,480, issued on August 17, 2010
  • “Identifying dependencies of an application upon a given security context,” U.S. Patent Number 7,784,101, issued on August 24, 2010
  • “Detecting user-mode rootkits,” U.S. Patent Number 7,874,001, issued on January 18, 2011
  • “Isolation environment-based information access,” U.S. Patent Number 8,024,815, issued on September 20, 2011

Web Search

Others

Projects

2010 – Present: Gaia Program—Skunkworks Projects

MinuteSort World Record, May 2012

  • Flat Datacenter Storage (FDS) technology broke both the Daytona and Indy records

Guinness World Records, May 2013

  • “Fastest time to type a text message (SMS) on a touch-screen mobile phone”—20.53 seconds (broke the existing record)
  • “Fastest time to type a text message (SMS) on a touch screen mobile phone while blindfolded”—25.90 seconds (set a new record)

2007 – 2010: Research & Advanced Development in Search, Advertising, and Online Services

Automated Relevance Diagnostics System (ARDS)

  • Jumpstarted Bing’s search quality process by collecting and deriving search dissatisfaction cases, performing end-to-end diagnosis to identify root causes and pinpoint responsible components, assigning each root-cause cluster to its owner team, and defining quality metrics to track progress;
  • Broadly recognized internally as a major contributor to Bing’s search quality improvement for the past two years.

Microsoft Web N-Gram

Structured Data Search: shipped Bing Wolfram|Alpha Answers (e.g., <{a href="http://www.bing.com/search?q=Brazil+Canada+GDP&form=QBRE&qs=n&sk=" originalAttribute="href" originalPath="http://www.bing.com/search?q=Brazil+Canada+GDP&form=QBRE&qs=n&sk=">Brazil Canada GDP})

Dynamic Crawling: for redirection-spam detection and dynamic-page analysis

    2002 – 2007: Research & Advanced Development in Cybersecurity and Systems Management

    • Founded the Systems Management Research Group, Microsoft Research, Redmond in 2004
    • Expanded it into the Cybersecurity & Systems Management Research Group in 2005

    Systems Management Projects

    • Strider Troubleshooter
    • Systematic configuration troubleshooter based on state differencing, access tracing, and statistical analysis (see June 2003 DSN paper, Oct. 2003 LISA Best Paper & Dec. 2004 OSDI paper)
    • Strider File and Registry tracers were shipped as part of Windows Vista.
    • Flight Data Recorder (FDR)
    • Highly efficient and highly compressed always-on tracing of persistent-state accesses for configuration monitoring (see 2006 OSDI paper & 2006 LISA paper)
    • FDR is now deployed on 1,000+ Microsoft production servers and 500+ desktop machines.
    • Patch Impact Analyzer
    • Intersecting always-on persistent-state access trace with patch manifest to predict potential stability impact due to patch installation (see May 2004 ICAC paper)
    • Shipped as part of Windows Vista Application Compatibility Toolkit (ACT)
    • Strider Security Tracer
    • A black-box tracing technique that identifies the causes for least privilege incompatibilities (i.e., application dependencies on Admin privileges) (see Feb. 2005 NDSS paper)
    • Shipped as part of Windows Vista Application Compatibility Toolkit (ACT)

    Cybersecurity Projects

    • Strider Gatekeeper
    • Proposed a characterization of spyware based on the concept of Auto-Start Extensibility Points (ASEPs) (see Nov. 2004 LISA paper)
    • This project jumpstarted Microsoft anti-spyware product planning and the ASEP concept influenced the actual product.
    • Strider GhostBuster
    • Proposed a cross-view diff-based approach to rootkit detection (see June 2005 DSN paper & Dec. 2005 LISA paper)
    • This project jumpstarted Microsoft anti-rootkit product planning. The GhostBuster tool was deployed on 200,000 internal machines.
    • Strider HoneyMonkey
    • Proposed a black-box, state-change-based, signature-free approach to detecting malicious websites that exploit known and zero-day browser vulnerabilities (see Feb. 2006 NDSS paper)
    • This technology was transferred to the Microsoft security unit, which now operates a production HoneyMonkey system.
    • Strider Typo-Patrol
    • Proposed a traffic redirection-based analysis for detecting large-scale, systematic domain cybersquatters (see July 2006 SRUTI paper)
    • The tool was released at http://research.microsoft.com/URLTracer and has been used by many trademark domain owners to identify cybersquatters.
    • Strider Search Ranger
    • Proposed a “Follow the Money” approach to detecting large-scale search spammers who are corrupting the Web with junk content and websites in order to promote their links to spam content into top search results (see Feb 2007 NDSS paper, May 2007 WWW paper, and June 2007 ICAC paper)
    • This technology was transferred to Microsoft Live Search organization and was proven to be very effective in reducing spam in search results.

    1997 – 2002: Research and Advanced Development in Distributed Systems and Networking

    COMERA

    • Component Object Model (COM) Extensible Remoting Architecture (see April 1998 COOTS paper)

    Millennium Falcon

    • Extensive marshaling, runtime, and transport optimizations for Distributed Component Object Model (DCOM) over Virtual Interface Architecture (VIA); achieved 72-microsecond round-trip time & 86-megabytes/sec application bandwidth (see July 1999 NT Symposium paper)

    Aladdin & Simba

    • Extensible remote home automation and sensing (see August 2000 Windows Systems Symposium paper & July 2001 DSN paper)

    Panorama – Theory

    • Distributed topology control for wireless multi-hop ad hoc networks, based on directional information; proved that "150 degrees" is a tight upper bound for guaranteeing global network connectivity (see April 2001 INFOCOM paper & August 2001 PODC paper)

    Masquerade

    • Conducted a 100,000-site experiment to show that traffic information consisting of the number of Web objects and object sizes suffices to identify many Web sites (see May 2002 IEEE SSP paper)

    1993 – 1997: Research and Advanced Development in Fault Tolerance

    Progressive Retry

    • Proposed the concept of software error recovery through staged rollbacks with increasing scopes and introduced non-determinism (see June 1993 FTCS paper & April 1995 PDS paper)

    Checkpointing Library

    • Implemented the first checkpointing library, named LibCkp, that supports rollback of file updates consistent with rollback of memory state (see June 1995 FTCS paper)
    • Deployed inside AT&T Bell Labs as part of the CosMiC idle-workstation hunter and process migration system (see Dec. 1997 paper)

    Checkpointing Survey

    • Initiated and co-authored the well-known checkpointing survey paper titled “A Survey of Rollback-Recovery Protocols in Message-passing Systems”, published in Sep. 2002 ACM Computing Surveys

    Rollback Dependency Trackability (RDT) – Theory

      • Introduced the concept of RDT, which captures the important property of allowing transitive dependency tracking to carry full information on rollback dependency set in an online fashion (see April 1997 IEEE TC paper)
      • Opened a brand new research direction with many follow-up papers

              Software Rejuvenation

              • Proposed and demonstrated the concept of proactively terminating and restarting applications to remove potential bad-state accumulation that could lead to failures and service downtime (see March 1996 paper in AT&T Technical Journal & June 1995 FTCS paper)

                  One-IP

                  • An IP routing-based cluster platform for scalable and fault-tolerant Web services (see April 1997 WWW paper)

                  Xept

                  • An object-code instrumentation tool for intercepting function calls based on a small C-like specification language (see Nov. 1997 ISSRE paper)

                  Publications

                  Journal papers

                  • Xuxian Jiang, Florian Buchholz, AAron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford, "Tracing Worm Break-in and Contaminations via Process Coloring: A Provenance-Preserving Approach", in IEEE Transactions on Parallel and Distributed Systems, 19(6), 2008
                  • Ming-Wei Wu, Yi-Min Wang, Yennun Huang, and Sy-Yen Kuo, “Self-Healing Spyware: Detection and Remediation,” in IEEE Transactions on Reliability, Vol. 56, No. 4, December 2007
                  • Xuxian Jiang, Dongyan Xu, Yi-Min Wang, "Collapsar: A VM-Based Honeyfarm and Reverse Honeyfarm Architecture for Network Attack Capture and Detention", Journal of Parallel and Distributed Computing, Special Issue on Security In Grid and Distributed Systems, 66(9), 2006
                  • L. Li, J. Y. Halpern, V. Bahl, Y. M. Wang and R. Wattenhofer, “Analysis of a Cone-Based Distributed Topology Control Algorithms for Wireless Multi-hop Networks,” IEEE/ACM Transaction On Networking, February, 2005.
                  • Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Yuan Chun, Helen J. Wang, and Zheng Zhang, “STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support,” Science of Computer Programming, Topics in System Administration, Volume 53, Issue 2, November 2004, pp. 143-164.
                  • Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, and Paul Larson, “Summary-based Routing for Content-based Event Distribution Networks,” Computer Communication Review (CCR), October 2004.
                  • O. P. Damani, Y. M. Wang, and V. K. Garg, “Distributed Recovery with K-optimistic Logging,” in J. Parallel and Distributed Computing, 63, pp. 1193-1218, 2003.
                  • E. N. Elnozahy, L. Alvisi, Y. M. Wang , and D. B. Johnson, “A Survey of Rollback-Recovery Protocols in Message-passing Systems,” ACM Computing Surveys, Vol. 34, Issue 3, pp. 375 – 408, Sept. 2002.
                  • J. Tsai, S.-Y. Kuo, and Y. M. Wang, " Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability," in IEEE Trans. on Parallel and Distributed Systems, Vol.9, No.10, pp.963-971, Oct. 1998.
                  • O. P. Damani, P. Y. Chung, Y. Huang, C. Kintala, and Y. M. Wang, " ONE-IP: Techniques for hosting a service on a cluster of machines," in Journal of Computer Networks and ISDN Systems, 29, 1019-1027, 1997.
                  • Y. M. Wang, Y. Huang, W. K. Fuchs, C. Kintala, and G. Suri, " Progressive retry for software failure recovery in message-passing applications," in IEEE Trans. on Computers, Vol. 46, No. 10, pp. 1137-1141, Oct. 1997.
                  • Y. M. Wang, " Consistent global checkpoints that contain a given set of local checkpoints," in IEEE Trans. on Computers, Vol. 46, No. 4, pp. 456-468, April 1997.
                  • Y. Huang, C. Kintala, L. Bernstein and Y. M. Wang, " Components for software fault tolerance and rejuvenation," in AT&T Technical Journal, pp. 29-37, March 1996.
                  • Y. M. Wang, P. Y. Chung, I. J. Lin, and W. K. Fuchs, " Checkpoint space reclamation for uncoordinated checkpointing in message-passing systems," in IEEE Trans. on Parallel and Distributed Systems, Vol. 6, No. 5, pp. 546-554, May 1995.
                  • Y. M. Wang, P. Y. Chung, and W. K. Fuchs, " Scheduling for periodic concurrent error detection in processor arrays," in J. Parallel and Distributed Computing, Vol. 23, No. 3, pp. 306-313, Dec. 1994.
                  • P. Y. Chung, Y. M. Wang, and I. N. Hajj, " Logic design errors diagnosis and correction," in IEEE Trans. on VLSI Systems, Vol. 2, No. 3, pp. 320-332, Sep. 1994.
                  • Y. M. Wang, H. Lee, and D. V. Apte, " Quantitative NMR spectroscopy by matrix pencil methods," in International Journal of Imaging Systems and Technology, Vol. 4, pp. 201-206, 1992.

                  Bulletins, Letters, and Magazine Papers

                  Conference Papers

                  • Ahmed Hassan, Ryen White, and Yi-Min Wang, “Using Groups of Poorly-Performing Queries to Improve Search,” in Proc. ACM Special Interest Group on Information Retrieval (SIGIR), July 2013
                  • Youngho Kim, Ahmed Hassan, Ryen W. White, and Yi-Min Wang “Playing by the Rules: Mining Query Associations to Predict Search Performance,” in Proc. the Sixth ACM International Conference on Web Search and Data Mining (WSDM), February 2013
                  • Chao Liu and Yi-Min Wang, “On the Connections between Explicit Semantic Analysis and Latent Semantic Analysis,” International Conference on Information and Knowledge Management (CIKM), 2012
                  • Chao Liu and Yi-Min Wang, “TrueLabel + Confusions: A Spectrum of Probabilistic Models in Analyzing Multiple Ratings,” International Conference on Machine Learning (ICML), June 2012.
                  • Chao Liu, Hung-chih Yang, Jinliang Fan, Li-Wei He, and Yi-Min Wang, “Distributed Non-negative Matrix Factorization for Web-Scale Dyadic Data Analysis on MapReduce,” International World Wide Web (WWW) Conference, April 2010
                  • Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert Greenberg, and Yi-Min Wang, “WebProphet: Automating Performance Prediction for Web Services,” in Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI '10), April 2010.
                  • Chao Liu, Mei Li, and Yi-Min Wang, "Post-Rank Reordering: Resolving Preference Misalignments between Search Engines and End Users," in Proc. the 18th ACM Conference on Information and Knowledge Management (CIKM), November 2009
                  • Fan Guo, Chao Liu, Anitha Kannan, Tom Minka, Michael Taylor, Yi-Min Wang, and Christos Faloutsos, "Click Chain Model in Web Search," in Proc. the 18th International World Wide Web Conference (WWW), April 2009
                  • Fan Guo, Chao Liu and Yi-Min Wang, “Efficient Multiple-Click Models in Web Search,” in Proc. the Second ACM International Conference on Web Search and Data Mining (WSDM), February 2009
                  • Xuxian Jiang, Helen Wang, Dongyan Xu and Yi-Min Wang, “RandSys: A Two-Dimensional Randomization Approach to Thwarting Code Injection Attacks,” in Proc. SRDS, 2007
                  • Yi-Min Wang and Ming Ma, “Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine,” in Proc. ICAC, June 2007
                  • Yi-Min Wang, Ming Ma, Yuan Niu, and Hao Chen, “Spam Double-Funnel: Connecting Web Spammers with Advertisers,” in Proc. WWW, May 2007
                  • Yuan Niu, Yi-Min Wang, Hao Chen, Ming Ma, and Francis Hsu, “A Quantitative Study of Forum Spamming Using Context-based Analysis,” in Proc. NDSS, February 2007
                  • Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo, “A Stateful Approach to Spyware Detection and Removal,” in Proc. PRDC, Dec. 2006.
                  • Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, and Yi-Min Wang, “LiveOps: Systems Management as a Service,” in Proc. Large Installation System Administration (LISA) Conference, 2006.
                  • Xuxian Jiang, Aaron Walters, Florian Buchholz, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford, "Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach", in Proc. IEEE International Conference on Distributed Computing Systems (ICDCS), Lisboa, Portugal, July 2006.
                  • Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, and Brad Daniels, “Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting,” in Proc. Usenix SRUTI Workshop, July 2006.
                  • Chad Verbowski, Emre Kıcıman, Brad Daniels, Arunvijary Kumar, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee, “Flight Data Recorder: Always-on Tracing and Scalable Analysis of Persistent State Interactions to Improve Systems and Security Management,” in Proc. Seventh Symposium on Operating Systems Design and Implementation (OSDI), 2006.
                  • Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch, "SubVirt: Implementing malware with virtual machines,” in Proc. IEEE Symp. on Security and Privacy (the Oakland Conference), May 2006.
                  • Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma, “Automated Known Problem Diagnosis with Event Traces,” in Proc. EuroSys, April 2006.
                  • Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, and Sam King, “Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities,” in Proc. Network and Distributed System Security (NDSS) Symposium, February 2006.
                  • Yi-Min Wang and Doug Beck, “Fast User-Mode Rootkit Scanner for the Enterprise, in Proc. Large Installation System Administration (LISA) Conference, December 2005.
                  • Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, and Chad Verbowski, “Detecting Stealth Software with Strider GhostBuster,” in Proc. IEEE International Conference on Dependable Systems and Networks (DSN), June 2005
                  • Shuo Chen, John Dunagan, Chad Verbowski, and Yi-Min Wang, “A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities,” in Proc. Network and Distributed System Security Symposium (NDSS), February 2005.
                  • Helen J. Wang, John Platt, Yu Chen, Ruyun Zhang, and Yi-Min Wang, “Automatic Misconfiguration Troubleshooting with PeerPressure,” in Proc. Sixth Symposium on Operating Systems Design and Implementation (OSDI), December 2004
                  • Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, and Sy-Yen Kuo, “Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management,” in Proc. Large Installation System Administration (LISA) Conference, November 2004
                  • Helen J. Wang, John Platt, Yu Chen, Ruyun Zhang, and Yi-Min Wang, “PeerPressure: A Statistical Method for Automatic Misconfiguration Troubleshooting,” ACM Sigmetrics Poster Paper, June 2004
                  • Archana Ganapathi, Yi-Min Wang, Ni Lao, and Ji-Rong Wen, “Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems,” in Proc. IEEE International Conference on Dependable Systems and Networks (DSN), June 2004
                  • Yi-Min Wang, “Computer Genomics: Towards Self- Change and Configuration Management,” in Proc. SELF-STAR: International Workshop on Self-Star Properties in Complex Information Systems, May 2004
                  • John Dunagan, Roussi Roussev, Brad Daniels, Aaron Johson, Chad Verbowski, and Yi-Min Wang, “Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests,” in Proc. Int. Conf. Autonomic Computing (ICAC), May 2004
                  • Emre Kiciman and Yi-Min Wang, “Discovering Correctness Constraints for Self-Management of System Configuration,” in Proc. Int. Conf. Autonomic Computing (ICAC), May 2004
                  • Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, and Yi-Min Wang, “Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting,” in Proc. IPTPS, February 2004
                  • Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Yuan Chun, Helen J. Wang, and Zheng Zhang, “STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support,” in Proc. Large Installation System Administration (LISA) Conference, October 2003 (Best Paper Award)
                  • Yi-Min Wang, Chad Verbowski, and Daniel R. Simon, “Persistent-state Checkpoint Comparison for Troubleshooting Configuration Failures,” in Proc. IEEE International Conference on Dependable Systems and Networks (DSN), June 2003
                  • Qixiang Sun, Daniel R. Simon, Y. M. Wang, Wilf Russell, Venkata N. Padmanabhan, and Lili Qiu, "Statistical Identification of Encrypted Web Browsing Traffic ," in Proc. IEEE Symposium on Security & Privacy (the Oakland conference), May 2002.
                  • L. Li, J. Y. Halpern, P. Bahl, Y. M. Wang, and R. Wattenhofer, "Analysis of a Cone-based Distributed Topology Control Algorithm for Wireless Multi-hop Networks," in Proc. ACM PODC, August 2001.
                  • Y. M. Wang, P. Bahl, and Wilf Russell, "The SIMBA User Alert Service Architecture for Dependable Alert Delivery," in Proc. IEEE DSN, July 2001.
                  • R. Wattenhofer, L. Li, P. Bahl, and Y. M. Wang, "Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks," in Proc. IEEE INFOCOM, April 2001.
                  • Y. M. Wang, W. Russell, and A. Arora, "A Toolkit for Building Dependable and Extensible Home Networking Applications," in Proc. 4th USENIX Windows Systems Symposium, August 2000.
                  • Y. M. Wang, et al., "Towards Dependable Home Networking: An Experience Report," in Proc. IEEE DSN/FTCS, June 2000.
                  • A. Forin, G. Hunt, L. Li, and Y. M. Wang, " High-Performance Distributed Objects over System Area Networks," in Proc. 3rd USENIX Windows NT Symp., pp. 21-30, July 1999.
                  • Y. M. Wang and W.-J. Lee, " COMERA: COM Extensible Remoting Architecture," in Proc. USENIX The Fourth Conference on Object-Oriented Technologies and Systems (COOTS), pp. 79-88, April 1998.
                  • Y. M. Wang, O. P. Damani, P. Y. Chung, Y. Huang, and C. Kintala, " Web Server Clustering with Single-IP Image: Design and Implementation," in Proc. Int. Symp. on Multimedia Information Processing, Dec. 1997.
                  • P. E. Chung, Y. Huang, S. Yajnik, G. Fowler, K. P. Vo, and Y. M. Wang " Checkpointing in CosMiC: a User-level Process Migration Environment," in Proc. Pacific Rim Int. Symp. on Fault-Tolerant Systems, Dec. 1997.
                  • K. P. Vo, Y. M. Wang, P. E. Chung, and Y. Huang, " Xept: A Software Instrumentation Method for Exception Handling," in Proc. Int. Symp. on Software Reliability Engineering (ISSRE), Nov. 1997.
                  • Y. M. Wang, O. P. Damani, and W.-J. Lee " Reliability and Availability Issues In Distributed Component Object Model (DCOM) (Position paper)," in Proc. International Workshop on Community Networking (CN4), pp. 59-63, Sept. 1997.
                  • O. P. Damani, Y. M. Wang, and V. K. Garg, " Optimistic distributed simulation based on transitive dependency tracking," in Proc. ACM Workshop on Parallel and Distributed Simulation (PADS), pp. 90-97, June 1997.
                  • Y. M. Wang, P. Y. Chung, Y. Huang and E. N. Elnozahy, " Integrating checkpointing with transaction processing," in Proc. IEEE Fault-Tolerant Computing Symposium (FTCS-27), pp. 304-308, June 1997.
                  • Y. M. Wang, O. P. Damani and V. K. Garg, " Distributed recovery with K-optimistic logging," in Proc. IEEE Int. Conf. on Distributed Computing Systems (ICDCS), pp. 60-67, May 1997.
                  • O. P. Damani, P. Y. Chung, Y. Huang, C. Kintala, and Y. M. Wang, " ONE-IP: Techniques for hosting a service on a cluster of machines," in Proc. the Sixth Int. World Wide Web Conference, April 1997.
                  • Y. M. Wang, P. Y. Chung, C. M. Lin, and Y. Huang, " HAWA: A client-side approach to high-availability web access," presented at the Sixth Int. World Wide Web Conference, April 1997.
                  • Y. M. Wang and W. K. Fuchs, " Optimal message log reclamation for uncoordinated checkpointing," in Fault-Tolerant Parallel and Distributed Systems, IEEE Computer Society Press, pp. 24-29, 1995.
                  • Y. M. Wang, M. Merritt, and A. B. Romanovsky, " Guaranteed deadlock recovery: Deadlock resolution with rollback propagation," in Proc. Pacific Rim International Symposium on Fault-Tolerant Systems, pp. 92-97, Dec. 1995.
                  • E. Cohen, Y. M. Wang, and G. Suri, " When piecewise determinism is almost true," in Proc. Pacific Rim International Symposium on Fault-Tolerant Systems, pp. 66-71, Dec. 1995.
                  • Y. M. Wang, " Maximum and minimum consistent global checkpoints and their applications," in Proc. IEEE Symp. Reliable Distributed Syst. (SRDS), pp. 86-95, Sept. 1995.
                  • Y. M. Wang, Y. Huang, K.-P. Vo, P. Y. Chung, and C. Kintala, " Checkpointing and its applications," in Proc. IEEE Fault-Tolerant Computing Symposium (FTCS-25), pp. 22-31, June 1995.
                  • Y. Huang and Y. M. Wang, " Why optimistic message logging has not been used in telecommunications systems," in Proc. IEEE Fault-Tolerant Computing Symposium (FTCS-25), pp. 459-463, June 1995.
                  • G. Suri, Y. Huang, Y. M. Wang, W. K. Fuchs and C. Kintala, " An implementation and performance measurement of the progressive retry technique," in Proc. IEEE International Computer Performance and Dependability Symposium, pp. 41-48, April 1995.
                  • Y. M. Wang and W. K. Fuchs, " Lazy checkpoint coordination for bounding rollback propagation," in Proc. IEEE Symp. on Reliable Distributed Systems (SRDS-12), pp. 78-85, Oct. 1993.
                  • P. Y. Chung, Y. M. Wang, and I. N. Hajj, " Diagnosis and correction of logic design errors in digital circuits," in Proc. the 30th ACM/IEEE Design Automation Conference, pp. 503-508, 1993.
                  • <!--[if !supportLists]-->61. <!--[endif]-->Y. M. Wang, Y. Huang, and W. K. Fuchs, " Progressive retry for software error recovery in distributed systems," in Proc. IEEE Fault-Tolerant Computing Symposium (FTCS-23), pp. 138-144, June 1993.
                  • Y. M. Wang, " Reducing Message Logging Overhead for Log-Based Recovery," in Proc. IEEE Int. Symp. on Circuits and Systems, pp. 1925-1928, May 1993.
                  • Y. M. Wang and W. K. Fuchs, " Optimistic message logging for independent checkpointing in message-passing systems," in Proc. IEEE Symp. on Reliable Distributed Systems (SRDS-11), pp. 147-154, Oct. 1992.
                  • Y. M. Wang and W. K. Fuchs, " Scheduling message processing for reducing rollback propagation," in Proc. IEEE Fault-Tolerant Computing Symposium (FTCS-22), pp. 204-211, July 1992.

                  Technical Reports and Dissertations

                  • Y. M. Wang, M. Merritt, A. Romanovsky, " Guaranteed Deadlock Recovery: Deadlock Resolution with Rollback Propagation," Tech. Rep. TR 648, Computing Dept., University of Newcastle upon Tyne, 1998.
                  • E. N. Elnozahy, D. B. Johnson, and Y. M. Wang, " A survey of rollback-recovery protocols in message-passing systems," Tech. Rep. No. CMU-CS-96-181, Dept. of Computer Science, Carnegie Mellon University, 1996.
                  • Y. M. Wang, P. Y. Chung, and W. K. Fuchs, " Tight upper bound on useful distributed system checkpoints," Tech. Rep. CRHC-95-16, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1995.
                  • Y. M. Wang, " Space reclamation for uncoordinated checkpointing in message-passing systems," Ph.D. Dissertation, Dept. of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, Aug. 1993
                  • Y. M. Wang, " Parameter estimation methods for NMR spectroscopy," Master's Thesis, Dept. of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, Jan. 1990.

                  In the News