Jedidiah R. Crandall
Orcid: 0000-0001-7864-2992Affiliations:
- University of New Mexico, USA
- University of California, Davis, USA
According to our database1,
Jedidiah R. Crandall
authored at least 67 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.unm.edu
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness, Security, and Performance.
CoRR, 2024
2023
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking.
ACM Comput. Surv., 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
2020
The Program with a Personality: Analysis of Elk Cloner, the First Personal Computer Virus.
CoRR, 2020
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
2019
Proc. Priv. Enhancing Technol., 2019
CoRR, 2019
Proceedings of the Conference on Computing & Sustainable Societies, 2019
2018
CoRR, 2018
CoRR, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 11th European Workshop on Systems Security, 2018
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017
2016
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.
Proceedings of the 2016 New Security Paradigms Workshop, 2016
High Fidelity Off-Path Round-Trip Time Measurement via TCP/IP Side Channels with Duplicate SYNs.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proc. Priv. Enhancing Technol., 2015
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall.
CoRR, 2014
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014
Proceedings of the 2014 USENIX Summit on Gaming, 2014
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Technical Foundations of Information Systems Security.
Proceedings of the Computing Handbook, 2014
2013
Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels.
Int. J. Digit. Crime Forensics, 2013
First Monday, 2013
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version.
CoRR, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
login Usenix Mag., 2012
Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012
Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries.
Proceedings of the New Security Paradigms Workshop, 2012
2011
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
2010
Digit. Investig., 2010
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Proceedings of the 19th USENIX Security Symposium, 2010
On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
2009
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Trans. Comput. Sci., 2009
Architectural Support for Securing Sensor Networks Against Remote Attacks.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009
2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
Proceedings of the Information Security, 11th International Conference, 2008
2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
ACM Trans. Archit. Code Optim., 2006
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006
2005
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2005
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Proceedings of the 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 2004
Proceedings of the 31st International Symposium on Computer Architecture (ISCA 2004), 2004
2003
Synchroscalar: Initial Lessons in Power-Aware Design of a Tile-Based Embedded Architecture.
Proceedings of the Power-Aware Computer Systems, Third International Workshop, 2003