Jedidiah Crandall
Jedidiah Crandall
Associate Professor, Arizona State University
Dirección de correo verificada de
Citado por
Citado por
Minos: Control data attack prevention orthogonal to memory model
JR Crandall, FT Chong
37th International Symposium on Microarchitecture (MICRO-37'04), 221-232, 2004
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
ConceptDoppler: a weather tracker for internet censorship.
JR Crandall, D Zinn, M Byrd, ET Barr, R East
CCS 7, 352-365, 2007
The velocity of censorship: High-fidelity detection of microblog post deletions
T Zhu, D Phipps, A Pridgen, JR Crandall, DS Wallach
22nd {USENIX} Security Symposium ({USENIX} Security 13), 227-240, 2013
Temporal search: Detecting hidden malware timebombs with virtual machines
JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong
ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006
Analyzing the Great Firewall of China Over Space and Time.
R Ensafi, P Winter, A Mueen, JR Crandall
Proc. Priv. Enhancing Technol. 2015 (1), 61-76, 2015
Minos: Architectural support for protecting control data
JR Crandall, SF Wu, FT Chong
ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 359-389, 2006
Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China
JC Park, JR Crandall
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
Synchroscalar: A multiple clock domain, power-aware, tile-based embedded processor
J Oliver, R Rao, P Sultana, J Crandall, E Czernikowski, LW Jones, ...
Proceedings. 31st Annual International Symposium on Computer Architecture …, 2004
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
DAS De Oliveira, JR Crandall, G Wassermann, SF Wu, Z Su, FT Chong
Proceedings of the 1st workshop on Architectural and system support for …, 2006
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities
JR Crandall, SF Wu, FT Chong
International Conference on Detection of Intrusions and Malware, and …, 2005
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
International Conference on Passive and Active Network Measurement, 109-118, 2014
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.
J Knockel, JR Crandall, J Saia
FOCI, 2011
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2015
Minos: Architectural support for software security through control data integrity
JR Crandall, F Chong
International Symposium on Microarchitecture 104, 2004
A security assessment of the minos architecture
JR Crandall, FT Chong
ACM SIGARCH Computer Architecture News 33 (1), 48-57, 2005
Original SYN: Finding machines hidden behind firewalls
X Zhang, J Knockel, JR Crandall
2015 IEEE Conference on Computer Communications (INFOCOM), 720-728, 2015
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software.
MI Al-Saleh, JR Crandall
LEET, 2011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20