Yi-Min on The
New York Times: Researchers
Track Down a Plague of Fake Web Pages, by John Markoff,
March 19, 2007
Yi-Min Wang, Ph.D.
Microsoft Research Technologies (MSR-T)
One Microsoft Way
ymwang <at> microsoft
Last Modified: April
I became a Deputy Managing
Director for Microsoft Research-Redmond (MSR-R) in August 2011. Together with Peter Lee and Eric Horvitz, we form the
Office of Directors (OOD) which supports all 300+ researchers and engineers
in the Lab towards the goals of Agility, Diversity, and Strategy. In November
2012, Eric and I became the Managing Co-Director of the lab when Peter expanded
his responsibility to manage all MSR US Labs.
I was previously Director
of ISRC (Internet Services
Research Center), an R&D organization dedicated to developing technologies
for Search, Ads, and Online Services. Between 2007 and 2011, ISRC had focused
on web-scale data-related technologies
including Search Quality Diagnosis and Metrics, Web-Scale Language Model,
Highly Interactive Dialog Model, Structured Data (e.g., Wolfram|Alpha
answers), and Scalable
Dynamic Crawling. Personally, I have been playing the role of Director of
Search Quality for the Bing team. I invented the Automated Relevance Diagnosis System (ARDS)
which takes hundreds of thousands of user dissatisfaction reports and performs
automated and systematic diagnosis to identify the Search component that is
responsible for causing each of the dissatisfactions. ARDS has been a critical
part of Bing teams search quality process and is widely recognized for its
contribution to Bings significant quality improvement from 2008 to 2011.
Prior to the creation of
ISRC, my research work was primarily in the areas of dependable computing
and web security. I was
elected to IEEE Fellow for my contributions in those two areas. I had published
extensively on checkpointing and rollback-recovery
and was a main co-author of the most influential survey paper on that topic.
In 2005, I invented Strider HoneyMonkey - the first automated system to patrol the Web and hunt
for malicious websites that exploit zero-day vulnerabilities. The HoneyMonkey technique has become the de facto standard for
both the security industry and the search engine industry. In 2007, I invented Strider Search Ranger
the first search-spam detection system
based on dynamic crawling and traffic analysis. The work was featured on New York Times
and has had an industry-wide impact on wiping out search-spam.
[See my full bio here.]
Director, Microsoft Research Technologies, January 2014
Co-Director, Microsoft Research-Redmond, November 2012
Managing Director, Microsoft Research-Redmond, August 2011
of 2010 - for contributions to
Dependable Computing and Web Security
Services Research Center (ISRC), Microsoft Research-Redmond, July 2009
Quality & Cyber-Intelligence Lab (SQ-CIL), Internet Services Research
Center (ISRC), July 2007
Manager, Cybersecurity& Systems Management (CSM) Research Group, 2005
Manager, Systems Management (SM) Research
Ph.D., Electrical and
Computer Engineering, University of Illinois at Urbana-Champaign, 1993
Engineering, National Taiwan University, 1986
- Associate Editor
- Keynote Speakers
- Security Challenges in An Increasingly
Connected World, (Slides in PDF) IEEE International Symposium on
Reliable Distributed Systems (SRDS), September 28,
- Adversarial Web
Crawling with Strider Monkeys, (Slides
in PDF) Internet Services Workshop,
November 6, 2008
- Online Advertising: The Good, The Bad,
and The Ugly,
(Slides in PDF)
International Symposium on Stabilization,
Safety, and Security of Distributed Systems (SSS),
November 17, 2006
- Program Committee
- Sponsored Research
Research Projects & Papers
- The Strider
Family of Projects and Their Internal and External Contributions
Liu, Hung-chih Yang, Jinliang Fan, Li-Wei He, and Yi-Min Wang,
Distributed Non-negative Matrix
Factorization for Web-Scale Dyadic Data Analysis on MapReduce,
International World Wide Web (WWW)
Conference, April 2010
Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert
Greenberg, and Yi-Min Wang,
WebProphet: Automating Performance Prediction for Web
Services, in Proc. USENIX Symposium
on Networked Systems Design and Implementation (NSDI '10), April 2010.
- Fan Guo, Chao Liu, Anitha Kannan, Tom Minka,
Michael Taylor, Yi-Min Wang, Christos Faloutsos,
Click Chain Model in Web Search, [PDF] in Proc. International World Wide Web (WWW) Conference, 2009
- Shuo Chen, Ziqing
Mao, Yi-Min Wang, Ming Zhang,
Pretty-Bad-Proxy: An Overlooked Adversary
in Browsers HTTPS Deployments, [PDF] in Proc. IEEE Symp.
on Security and Privacy (the Oakland Conference), May 2009
- Shuo Chen, Jose Meseguer, Ralf Sasse, Helen
Wang, and Yi-Min Wang
A Systematic Approach to Uncover GUI Logic Flaws for Web Security,
in Proc. IEEE Symp. on
Security and Privacy (the Oakland Conference), May 2007
- Samuel T. King, Peter M. Chen,
Yi-Min Wang, Chad Verbowski,
Helen J. Wang, Jacob R. Lorch,
SubVirt: Implementing malware with virtual
machines, [PDF] in Proc.
IEEE Symp. on Security and
Privacy (the Oakland Conference), May 2006.
o IEEE Transactions on Computers,
o SRDS Opening Keynote:
Security Challenges in An
Increasingly Connected World, September 28, 2009
o Keynote at Internet
Services Workshop: Adversarial Web Crawling with Strider Monkeys, November 6,
o SSS Opening Keynote: Online
Advertising: The Good, The Bad, and The Ugly, November 17, 2006
o Program Co-Chair, International Conference on Autonomic Computing
o Program Vice-Chair,
Fault Tolerant and Dependable Computing Track, International Conference on Distributed Computing Systems (ICDCS), 2005
o Program Co-Chair, The 6th Usenix
Conference on Object-Oriented Technologies and Systems (COOTS), 2001
Conference on Dependable Systems and Networks (DSN), 2011, 2009, 2008, 2007,
2006, 2002, 2001, 2000
Conference on Distributed Computing Systems (ICDCS), 2007, 2006, 2002, 2000,
o Usenix Security Symposium,
o Symposium on Reliable
Distributed Systems (SRDS), 2005
Conference on Autonomic Computing (ICAC), 2004
o ACM Symposium on
Principles of Distributed Computing (PODC), 2002
Things I like J:
crabs crossing road on Christmas Island [video]
- Strider: Cybersecurity & Systems Management
- Publications (see a complete list of Strider
- Yi-Min Wang, Ming Ma, Yuan Niu, and Hao Chen, Spam
Double-Funnel: Connecting Web Spammers with Advertisers,
in Proc. International World Wide
Web (WWW) Conference, May 2007
- Y. Niu, Y. M. Wang, H. Chen, M. Ma, and F. Hsu,
Quantitative Study of Forum Spamming Using Context-based Analysis,
in Proc. Network and Distributed
System Security (NDSS) Symposium, Feb. 2007.
- Chad Verbowski, Emre Kıcıman, Brad
Daniels, Arunvijary Kumar, Yi-Min Wang, Roussi Roussev, Shan Lu,
Juhan Lee, Flight
Data Recorder: Always-on Tracing and Scalable Analysis of Persistent
State Interactions to Improve Systems and Security Management,
in Proc. Seventh
Symposium on Operating Systems Design and Implementation (OSDI),
- Yi-Min Wang,
Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, and Sam King, Automated
Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit
Browser Vulnerabilities, in Proc. Network
and Distributed System Security (NDSS) Symposium,
- Yi-Min Wang, Doug Beck, Binh
Vo, Roussi Roussev, and Chad Verbowski, Detecting
Stealth Software with Strider GhostBuster, in Proc. IEEE International Conference
on Dependable Systems and Networks (DSN), June 2005.
- Helen J. Wang, John Platt, Yu Chen, Ruyun Zhang, and Yi-Min Wang, Automatic
Misconfiguration Troubleshooting with PeerPressure, in Proc. Sixth Symposium on Operating Systems Design and
Implementation (OSDI), Dec. 2004
- Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu,
Yennun Huang, and Sy-Yen Kuo, Gatekeeper:
Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management,
Usenix LISA, Nov. 2004
- Yi-Min Wang,
Chad Verbowski, John Dunagan, Yu Chen, Helen
J. Wang, Chun Yuan, and Zheng Zhang, STRIDER:
A Black-box, State-based Approach to Change and Configuration Management
and Support, in Proc.
Usenix LISA (Best Paper), pp. 159-172,
- Yi-Min Wang, Chad Verbowski, and Daniel R.
Checkpoint Comparison for Troubleshooting Configuration Failures,
in Proc. IEEE DSN, June 2003.
STRIDER: A New Approach to Configuration and
- Invited Talk,
Stanford University, May 6, 2003.
- Invited Talk,
UC Berkeley, Oct. 28, 2004
- Invited Talk, Georgia
Tech, Nov. 18, 2004
- Masquerade: "You can
encrypt, but you can't hide." Traffic patterns tell a lot about the Web sites
that you're browsing.
- Panorama: Distributed
topology control for wireless multi-hop ad hoc networks, based on
- Proved that "150 degrees" can be special
- it's a tight upper bound for guaranteeing global network connectivity!
- L. Li, J. Y. Halpern, P. Bahl, Y. M. Wang, and
R. Wattenhofer, "
Analysis of a Cone-based Distributed Topology Control Algorithm for
Wireless Multi-hop Networks," in Proc. ACM PODC,
August 2001. (Conference
- R. Wattenhofer, L. Li, P. Bahl, and Y. M. Wang, "Distributed
Topology Control for Power Efficient Operation in Multihop Wireless Ad
Hoc Networks," in Proc. IEEE INFOCOM, April
networks as an extension of the Web
- You can send secure emails to close your garage
door; you get an Instant Message when an earthquake causes a power outage
- Y. M. Wang, W. Russell, and A. Arora, "
A Toolkit for Building Dependable and Extensible Home Networking
Applications," in Proc. 4th
USENIX Windows Systems Symposium, August 2000.
- Y. M. Wang, et al., "Towards
Dependable Home Networking: An Experience Report," in Proc.
IEEE DSN/FTCS, June 2000.
- Y. M. Wang, P.
Bahl, and Wilf Russell, "The
SIMBA User Alert Service Architecture for Dependable Alert Delivery,"
IEEE DSN, July 2001.
- A. Arora, R. Jagannathan and Y. M. Wang, "Model-based
Design of Dependability in Distributed Systems", in Workshop
on Concurrency in Dependable Computing, Newcastle, England 2001.
- A. Arora, R. Jagannathan
and Y. M. Wang, "Model-based
Fault Detection in Powerline Networking", in Proc.
International Parallel and Distributed Processing Symposium (IPDPS),
- High-level system architecture
- Conference presentation slides
- MobiSys 2003 Panel Presentation Slide Deck
- IEEE ISORC 2005 Panel Presentation Slide Deck
- Millennium Falcon: Fast DCOM over
SAN (System Area Network)
E. N. Elnozahy, L. Alvisi, Y. M.
Wang , and D. B. Johnson, A
Survey of Rollback-Recovery Protocols in Message-passing Systems,
ACM Computing Surveys, Vol. 34, Issue 3, pp. 375 408, Sept. 2002.
- P. E. Chung, Y. Huang, S. Yajnik,
D. Liang, J. C. Shih, C.-Y. Wang, and Y. M. Wang, "
DCOM and CORBA Side by Side, Step By Step, and Layer by Layer,"
in C++ Report, Jan. 1998.
- Y. M. Wang and Woei-Jyh Lee, "
COMERA: COM Extensible Remoting Architecture," in Proc.
COOTS, April 1998.
- J. Tsai, S.-Y.
Kuo, and Y. M. Wang, "
Theoretical Analysis for Communication-Induced Checkpointing Protocols
with Rollback-Dependency Trackability,
IEEE Trans. on Parallel and Distributed Systems, Oct. 1998.
- Y. M. Wang and
P.-Y. E. Chung, "
Exploring Customization of Distributed Systems using COM,"
IEEE Concurrency Magazine, July-Sep. 1998.