Search the dblp DataBase
Jedidiah R. Crandall :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jedidiah R. Crandall , Gary Wassermann , Daniela A. S. de Oliveira , Zhendong Su , Shyhtsun Felix Wu , Frederic T. Chong Temporal search: detecting hidden malware timebombs with virtual machines. [Citation Graph (0, 0)][DBLP ] ASPLOS, 2006, pp:25-36 [Conf ] Daniela A. S. de Oliveira , Jedidiah R. Crandall , Gary Wassermann , Shyhtsun Felix Wu , Zhendong Su , Frederic T. Chong ExecRecorder: VM-based full-system replay for attack analysis and system recovery. [Citation Graph (0, 0)][DBLP ] ASID, 2006, pp:66-71 [Conf ] Jedidiah R. Crandall , Zhendong Su , Shyhtsun Felix Wu , Frederic T. Chong On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:235-248 [Conf ] Jedidiah R. Crandall , Shyhtsun Felix Wu , Frederic T. Chong Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. [Citation Graph (0, 0)][DBLP ] DIMVA, 2005, pp:32-50 [Conf ] John Oliver , Ravishankar Rao , Paul Sultana , Jedidiah R. Crandall , Erik Czernikowski , Leslie W. Jones IV , Diana Franklin , Venkatesh Akella , Frederic T. Chong Synchroscalar: A Multiple Clock Domain, Power-Aware, Tile-Based Embedded Processor. [Citation Graph (0, 0)][DBLP ] ISCA, 2004, pp:150-161 [Conf ] Jedidiah R. Crandall , Frederic T. Chong Minos: Control Data Attack Prevention Orthogonal to Memory Model. [Citation Graph (0, 0)][DBLP ] MICRO, 2004, pp:221-232 [Conf ] John Oliver , Ravishankar Rao , Paul Sultana , Jedidiah R. Crandall , Erik Czernikowski , Leslie W. Jones IV , Dean Copsey , Diana Keen , Venkatesh Akella , Frederic T. Chong Synchroscalar: Initial Lessons in Power-Aware Design of a Tile-Based Embedded Architecture. [Citation Graph (0, 0)][DBLP ] PACS, 2003, pp:73-85 [Conf ] Jedidiah R. Crandall , Frederic T. Chong A security assessment of the minos architecture. [Citation Graph (0, 0)][DBLP ] SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:48-57 [Journal ] Jedidiah R. Crandall , Shyhtsun Felix Wu , Frederic T. Chong Minos: Architectural support for protecting control data. [Citation Graph (0, 0)][DBLP ] TACO, 2006, v:3, n:4, pp:359-389 [Journal ] ConceptDoppler: a weather tracker for internet censorship. [Citation Graph (, )][DBLP ] Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China. [Citation Graph (, )][DBLP ] Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. [Citation Graph (, )][DBLP ] Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. [Citation Graph (, )][DBLP ] Architectural Support for Securing Sensor Networks Against Remote Attacks. [Citation Graph (, )][DBLP ] Search in 0.022secs, Finished in 0.023secs