Jason Franklin
Jason Franklin
Research Associate, Stanford University
Bestätigte E-Mail-Adresse bei cs.stanford.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
6882009
An inquiry into the nature and causes of the wealth of internet miscreants.
J Franklin, A Perrig, V Paxson, S Savage
ACM conference on Computer and communications security 10, 1315245.1315292, 2007
5192007
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
J Franklin, D McCoy, P Tabriz, V Neagoe, JV Randwyk, D Sicker
USENIX Security Symposium 3, 16-89, 2006
3062006
Compatibility Is Not Transparency: VMM Detection Myths and Realities.
T Garfinkel, K Adams, A Warfield, J Franklin
HotOS, 2007
2582007
Mapping Internet Sensors with Probe Response Attacks.
J Bethencourt, J Franklin, MK Vernon
USENIX security symposium, 193-208, 2005
1782005
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
2009 30th IEEE Symposium on Security and Privacy, 221-236, 2009
1372009
Replayer: Automatic protocol replay by binary analysis
J Newsome, D Brumley, J Franklin, D Song
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1352006
The data on diversity
B Nelson
Communications of the ACM 57 (11), 86-95, 2014
97*2014
Energy-efficient cluster computing with FAWN: Workloads and implications
V Vasudevan, D Andersen, M Kaminsky, L Tan, J Franklin, I Moraru
Proceedings of the 1st International Conference on Energy-Efficient …, 2010
682010
Remote detection of virtual machine monitors with fuzzy benchmarking
J Franklin, M Luk, JM McCune, A Seshadri, A Perrig, L Van Doorn
ACM SIGOPS Operating Systems Review 42 (3), 83-92, 2008
582008
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Communications of the ACM 54 (7), 101-109, 2011
492011
FAWNdamentally power-efficient clusters
V Vasudevan, J Franklin, D Andersen, A Phanishayee, L Tan, ...
Carnegie Mellon University, 2009
412009
Compositional system security with interface-confined adversaries
D Garg, J Franklin, D Kaynar, A Datta
Electronic Notes in Theoretical Computer Science 265, 49-71, 2010
372010
Attacking, repairing, and verifying SecVisor: A retrospective on the security of a hypervisor
J Franklin, A Seshadri, N Qu, S Chaki, A Datta
Tech. Rep. CMU-CyLab-08-008, Carnegie Mellon University, 2008
372008
Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size
J Franklin, S Chaki, A Datta, A Seshadri
2010 IEEE Symposium on Security and Privacy, 365-379, 2010
262010
On adversary models and compositional security
A Datta, J Franklin, D Garg, L Jia, D Kaynar
IEEE Security & Privacy 9 (3), 26-32, 2010
252010
Parametric verification of address space separation
J Franklin, S Chaki, A Datta, JM McCune, A Vasudevan
International Conference on Principles of Security and Trust, 51-68, 2012
192012
Towards sound detection of virtual machines
J Franklin, M Luk, JM McCune, A Seshadri, A Perrig, L van Doorn
Botnet Detection, 89-116, 2008
192008
PRISM: enabling personal verification of code integrity, untampered execution, and trusted i/o on legacy systems or human-verifiable code execution
J Franklin, M Luk, A Seshadri, A Perrig
Carnegie Mellon University, 2007
112007
Faceted application search
J Franklin, A Kashyap
US Patent 9,311,413, 2016
92016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20