Folgen
Jedidiah Crandall
Jedidiah Crandall
Associate Professor, Arizona State University
Bestätigte E-Mail-Adresse bei asu.edu
Titel
Zitiert von
Zitiert von
Jahr
Minos: Control data attack prevention orthogonal to memory model
JR Crandall, FT Chong
37th International Symposium on Microarchitecture (MICRO-37'04), 221-232, 2004
6672004
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2562005
ConceptDoppler: a weather tracker for internet censorship.
JR Crandall, D Zinn, M Byrd, ET Barr, R East
CCS 7, 352-365, 2007
1822007
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies, 2015
1572015
Temporal search: Detecting hidden malware timebombs with virtual machines
JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong
ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006
1192006
Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China
JC Park, JR Crandall
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
902010
Minos: Architectural support for protecting control data
JR Crandall, SF Wu, FT Chong
ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 359-389, 2006
862006
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
DAS De Oliveira, JR Crandall, G Wassermann, SF Wu, Z Su, FT Chong
Proceedings of the 1st workshop on Architectural and system support for …, 2006
782006
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities
JR Crandall, SF Wu, FT Chong
Detection of Intrusions and Malware, and Vulnerability Assessment: Second …, 2005
762005
Synchroscalar: A multiple clock domain, power-aware, tile-based embedded processor
J Oliver, R Rao, P Sultana, J Crandall, E Czernikowski, LW Jones IV, ...
ACM SIGARCH Computer Architecture News 32 (2), 150, 2004
762004
Idle port scanning and non-interference analysis of network protocol stacks using model checking
R Ensafi, JC Park, D Kapur, JR Crandall
19th USENIX Security Symposium (USENIX Security 10), 2010
752010
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014
742014
Three Researchers, Five Conjectures: An Empirical Analysis of {TOM-Skype} Censorship and Surveillance
J Knockel, JR Crandall, J Saia
USENIX Workshop on Free and Open Communications on the Internet (FOCI 11), 2011
582011
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
552015
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
472013
We chat, they watch: How international users unwittingly build up WeChat’s Chinese censorship apparatus
J Knockel, C Parsons, L Ruan, R Xiong, J Crandall, R Deibert
412020
Minos: Architectural support for software security through control data integrity
JR Crandall, F Chong
International Symposium on Microarchitecture 104, 2004
362004
{OpenVPN} is open to {VPN} fingerprinting
D Xue, R Ramesh, A Jain, M Kallitsis, JA Halderman, JR Crandall, ...
31st USENIX Security Symposium (USENIX Security 22), 483-500, 2022
312022
Original SYN: Finding machines hidden behind firewalls
X Zhang, J Knockel, JR Crandall
2015 IEEE Conference on Computer Communications (INFOCOM), 720-728, 2015
302015
The ecology of malware
JR Crandall, R Ensafi, S Forrest, J Ladau, B Shebaro
Proceedings of the 2008 New Security Paradigms Workshop, 99-106, 2008
292008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20