The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jedidiah R. Crandall: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
    Temporal search: detecting hidden malware timebombs with virtual machines. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2006, pp:25-36 [Conf]
  2. Daniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong
    ExecRecorder: VM-based full-system replay for attack analysis and system recovery. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:66-71 [Conf]
  3. Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
    On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:235-248 [Conf]
  4. Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong
    Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:32-50 [Conf]
  5. John Oliver, Ravishankar Rao, Paul Sultana, Jedidiah R. Crandall, Erik Czernikowski, Leslie W. Jones IV, Diana Franklin, Venkatesh Akella, Frederic T. Chong
    Synchroscalar: A Multiple Clock Domain, Power-Aware, Tile-Based Embedded Processor. [Citation Graph (0, 0)][DBLP]
    ISCA, 2004, pp:150-161 [Conf]
  6. Jedidiah R. Crandall, Frederic T. Chong
    Minos: Control Data Attack Prevention Orthogonal to Memory Model. [Citation Graph (0, 0)][DBLP]
    MICRO, 2004, pp:221-232 [Conf]
  7. John Oliver, Ravishankar Rao, Paul Sultana, Jedidiah R. Crandall, Erik Czernikowski, Leslie W. Jones IV, Dean Copsey, Diana Keen, Venkatesh Akella, Frederic T. Chong
    Synchroscalar: Initial Lessons in Power-Aware Design of a Tile-Based Embedded Architecture. [Citation Graph (0, 0)][DBLP]
    PACS, 2003, pp:73-85 [Conf]
  8. Jedidiah R. Crandall, Frederic T. Chong
    A security assessment of the minos architecture. [Citation Graph (0, 0)][DBLP]
    SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:48-57 [Journal]
  9. Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong
    Minos: Architectural support for protecting control data. [Citation Graph (0, 0)][DBLP]
    TACO, 2006, v:3, n:4, pp:359-389 [Journal]

  10. ConceptDoppler: a weather tracker for internet censorship. [Citation Graph (, )][DBLP]


  11. Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China. [Citation Graph (, )][DBLP]


  12. Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. [Citation Graph (, )][DBLP]


  13. Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. [Citation Graph (, )][DBLP]


  14. Architectural Support for Securing Sensor Networks Against Remote Attacks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002