Jonathan M. Smith

Affiliations:
  • University of Pennsylvania, Philadelphia, PA, USA


According to our database1, Jonathan M. Smith authored at least 133 papers between 1988 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Software Packet-Level Network Analytics at Cloud Scale.
IEEE Trans. Netw. Serv. Manag., 2021

μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
DeepMatch: practical deep packet inspection in the data plane using network processors.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
FinalFilter: Asserting Security Properties of a Processor at Runtime.
IEEE Micro, 2019

Ignis: scaling distribution-oblivious systems with light-touch distribution.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

PIQ: Persistent Interactive Queries for Network Security Analytics.
Proceedings of the SDN-NFV@CODASPY 2019, 2019

TMC: Pay-as-you-Go Distributed Communication.
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019

2018
Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

BreakApp: Automated, Flexible Application Compartmentalization.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

The Web as a Distributed Computing Platform.
Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking, 2018

Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale.
Proceedings of the Internet Measurement Conference 2018, 2018

Packet-Level Analytics in Software without Compromises.
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018

Turboflow: information rich flow record generation on commodity switches.
Proceedings of the Thirteenth EuroSys Conference, 2018

2017
Toward algorithmic transparency and accountability.
Commun. ACM, 2017

Towards Fine-grained, Automated Application Compartmentalization.
Proceedings of the 9th Workshop on Programming Languages and Operating Systems, 2017

Query-efficient Partitions for Dynamic Data.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Enabling Practical Software-defined Networking Security Applications with OFX.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

MAP-IT: Multipass Accurate Passive Inferences from Traceroute.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Timing-based reconnaissance and defense in software-defined networks.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Cross-domain collaboration for improved IDS rule set selection.
J. Inf. Secur. Appl., 2015

Programming the quantum future.
Commun. ACM, 2015

Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

The emperor's new masks: On demographic differences and disguises.
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015

POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

Architectural Support for Software-Defined Metadata Processing.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
Quipper: Concrete Resource Estimation in Quantum Algorithms.
CoRR, 2014

Privacy-aware message exchanges for HumaNets.
Comput. Commun., 2014

A brief overview of the NEBULA future internet architecture.
Comput. Commun. Rev., 2014

PUMP: a programmable unit for metadata processing.
Proceedings of the HASP 2014, 2014

RotoRouter: Router support for endpoint-authorized decentralized traffic filtering to prevent DoS attacks.
Proceedings of the 2014 International Conference on Field-Programmable Technology, 2014

Moving Targets: Security and Rapid-Release in Firefox.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Observations from the 2012 mobile world congress in Barcelona.
Comput. Commun. Rev., 2013

Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013


Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Increasing network resilience through edge diversity in NEBULA.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2012

MOSAIC: Declarative platform for dynamic overlay composition.
Comput. Networks, 2012

Collaborative Red Teaming for Anonymity System Evaluation.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail.
Proceedings of the Security Protocols XX, 2012

Hardware Support for Safety Interlocks and Introspection.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012

Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.
Proceedings of the Computer Security - ESORICS 2012, 2012

Practicality of accelerometer side channels on smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Disinformation: A Taxonomy.
IEEE Secur. Priv., 2011

Preliminary design of the SAFE platform.
Proceedings of the 6th Workshop on Programming Languages and Operating Systems, 2011

2010
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
login Usenix Mag., 2010

Smudge Attacks on Smartphone Touch Screens.
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010

Evading Cellular Data Monitoring with Human Movement Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Blood in the Water - Are there Honeymoon Effects Outside Software?
Proceedings of the Security Protocols XVIII, 2010

Differential privacy for collaborative security.
Proceedings of the Third European Workshop on System Security, 2010

Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
RF-mobility gain: concept, measurement campaign, and exploitation.
IEEE Wirel. Commun., 2009

Guest editorial network infrastructure configuration.
IEEE J. Sel. Areas Commun., 2009

Dynamic Trust Management.
Computer, 2009

The dynamic community of interest and its realization in ZODIAC.
IEEE Commun. Mag., 2009

Viewpoint - On public service and computer science.
Commun. ACM, 2009

Fighting physics: a tough battle.
Commun. ACM, 2009

QuanTM: a quantitative trust management system.
Proceedings of the Second European Workshop on System Security, 2009

Networking hardware: what drives innovation?
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

2008
Decentralized access control in distributed file systems.
ACM Comput. Surv., 2008

MOSAIC: unified declarative platform for dynamic overlay composition.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
Requirements for scalable access control and security management architectures.
ACM Trans. Internet Techn., 2007

Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.
Int. J. Netw. Secur., 2007

S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Networkmd: topology inference and failure diagnosis in the last mile.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

2006
IDES: An Internet Distance Estimation Service for Large Networks.
IEEE J. Sel. Areas Commun., 2006

Flexible network monitoring with FLAME.
Comput. Networks, 2006

2005
DHARMA: distributed home agent for robust mobile access.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

An operating system architecture for network processors.
Proceedings of the 2005 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2005

2004
Active Networking: One View of the Past, Present, and Future.
IEEE Trans. Syst. Man Cybern. Part C, 2004

Hybrid Hierarchical Overlay Routing (Hyho): Towards Minimal Overlay Dilation.
IEICE Trans. Inf. Syst., 2004

2003
A secure PLAN.
IEEE Trans. Syst. Man Cybern. Part C, 2003

Balancing performance and flexibility with hardware support for network architectures.
ACM Trans. Comput. Syst., 2003

Design and Implementation of Virtual Private Services.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Secure and Flexible Global File Sharing.
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003

Engineering Privacy in Public: Confounding Face Recognition.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

The STRONGMAN Architecture.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
The influence of ATM on operating systems.
Comput. Commun. Rev., 2002

Sub-operating systems: a new approach to application security.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

Efficient packet monitoring for network management.
Proceedings of the Management Solutions for the New Communications World, 2002

2001
The price of safety in an active network.
J. Commun. Networks, 2001

Practical Network Applications on a Lightweight Active Management Environment.
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001

2000
Secure quality of service handling: SQoSH.
IEEE Commun. Mag., 2000

A Flexible IP Active Networks Architecture.
Proceedings of the Active Networks, Second International Working Conference, 2000

Scalable Resource Control in Active Networks.
Proceedings of the Active Networks, Second International Working Conference, 2000

Implementing a distributed firewall.
Proceedings of the CCS 2000, 2000

1999
Activating Networks: A Progress Report.
Computer, 1999

Programmable Networks: Selected Challenges in Computer Networking.
Computer, 1999

EROS: a fast capability system.
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999

The Architecture of ALIEN.
Proceedings of the Active Networks, First International Working Conference, 1999

FPGA Viruses.
Proceedings of the Field-Programmable Logic and Applications, 9th International Workshop, 1999

Security in Active Networks.
Proceedings of the Secure Internet Programming, 1999

1998
A secure active network environment architecture: realization in SwitchWare.
IEEE Netw., 1998

The SwitchWare active network architecture.
IEEE Netw., 1998

Protocol boosters.
IEEE J. Sel. Areas Commun., 1998

Security for Virtual Private Intranets.
Computer, 1998

Protocol boosters: applying programmability to network infrastructures.
IEEE Commun. Mag., 1998

Safety and security of programmable network infrastructures.
IEEE Commun. Mag., 1998

Functional divisions in the Piglet multiprocessor operating system.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

Automated Recovery in a Secure Bootstrap Process.
Proceedings of the Network and Distributed System Security Symposium, 1998

1997
A survey of active network research.
IEEE Commun. Mag., 1997

A Secure and Reliable Bootstrap Architecture.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Active Bridging.
Proceedings of the ACM SIGCOMM 1997 Conference on Applications, 1997

P4: A platform for FPGA implementation of protocol boosters.
Proceedings of the Field-Programmable Logic and Applications, 7th International Workshop, 1997

1996
Design, Implementation, and Experiences of the OMEGA End-Point Architecture.
IEEE J. Sel. Areas Commun., 1996

State Caching in the EROS Kernel.
Proceedings of the 7th Workshop on Persistent Object Systems, 1996

New Algorithms for Admission Control and Scheduling to Support Multimedia Feedback Remote Control Applications.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

1995
Striping within the network subsystem.
IEEE Netw., 1995

The QOS Broker.
IEEE Multim., 1995

1994
PDIS and The Information Highway.
Proceedings of the Third International Conference on Parallel and Distributed Information Systems (PDIS 94), 1994

Quad-Tree Segmentation for Texture-Based Image Query.
Proceedings of the Second ACM International Conference on Multimedia '94, 1994

A Service Kernel for Multimedia Endstations.
Proceedings of the Multimedia: Advanced Teleservices and High-Speed Communication Architectures, 1994

1993
Giving applications access to Gb/s networking.
IEEE Netw., 1993

Hardware/Software Organization of a High-Performance ATM Host Interface.
IEEE J. Sel. Areas Commun., 1993

The AURORA Gigabit Testbed.
Comput. Networks ISDN Syst., 1993

An application-driven approach to networked multimedia systems.
Proceedings of the 18th Conference on Local Computer Networks, 1993

1992
An integrated multimedia architecture for high-speed networks (brief extended abstract).
Comput. Commun. Rev., 1992

An Overview of the AURORA Gigabit Testbed.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

1991
Memory as a network abstraction.
IEEE Netw., 1991

The Software Design Laboratory.
Comput. Syst., 1991

Traffic Characteristics of a Distributed Memory System.
Comput. Networks ISDN Syst., 1991

A High-Performance Host Interface for ATM Networks.
Proceedings of the Conference on Communications Architecture & Protocols, 1991

Exploiting Parallelism in Hardware Implementations of the DES.
Proceedings of the Advances in Cryptology, 1991

1990
A Taxonomy-Based Comparison of Several Distributed Shared Memory Systems.
ACM SIGOPS Oper. Syst. Rev., 1990

1989
Rapid Location of Mount Points.
Softw. Pract. Exp., 1989

Measured response times for page-sized fetches on a network.
SIGARCH Comput. Archit. News, 1989

Exploring "Multiple Worlds" in Parallel.
Proceedings of the International Conference on Parallel Processing, 1989

Transparent Concurrent Execution of Mutually Exclusive Alternatives.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989

Practical Problems with a Cryptographic Protection Scheme.
Proceedings of the Advances in Cryptology, 1989

1988
Process migration: effects on scientific computation.
ACM SIGPLAN Notices, 1988

A Survey of Process Migration Mechanisms.
ACM SIGOPS Oper. Syst. Rev., 1988

Effects of Copy-on-Write Memory Management on the Response Time of UNIX Fork Operations.
Comput. Syst., 1988


  Loading...