James Newsome
According to our database1,
James Newsome
authored at least 26 papers
between 2003 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8190-4, 2014
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
2013
Proceedings of the Security Protocols XXI, 2013
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
J. Commun. Networks, 2011
2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
2009
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
IEEE Trans. Dependable Secur. Comput., 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
2007
Proceedings of the Malware Detection, 2007
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2005
2004
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004
2003
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003