Jonathan M. Smith
Affiliations:- University of Pennsylvania, Philadelphia, PA, USA
According to our database1,
Jonathan M. Smith
authored at least 133 papers
between 1988 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2021
IEEE Trans. Netw. Serv. Manag., 2021
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
2020
DeepMatch: practical deep packet inspection in the data plane using network processors.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
2019
IEEE Micro, 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the SDN-NFV@CODASPY 2019, 2019
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019
2018
Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018
Proceedings of the Thirteenth EuroSys Conference, 2018
2017
Proceedings of the 9th Workshop on Programming Languages and Operating Systems, 2017
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017
2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
J. Inf. Secur. Appl., 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2014
Comput. Commun. Rev., 2014
Proceedings of the HASP 2014, 2014
RotoRouter: Router support for endpoint-authorized decentralized traffic filtering to prevent DoS attacks.
Proceedings of the 2014 International Conference on Field-Programmable Technology, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Comput. Commun. Rev., 2013
Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013
Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 6th Workshop on Programming Languages and Operating Systems, 2011
2010
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
login Usenix Mag., 2010
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Third European Workshop on System Security, 2010
Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
IEEE Wirel. Commun., 2009
IEEE J. Sel. Areas Commun., 2009
IEEE Commun. Mag., 2009
Proceedings of the Second European Workshop on System Security, 2009
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009
2008
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008
2007
ACM Trans. Internet Techn., 2007
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.
Int. J. Netw. Secur., 2007
S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007
2006
IEEE J. Sel. Areas Commun., 2006
2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the 2005 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2005
2004
IEEE Trans. Syst. Man Cybern. Part C, 2004
IEICE Trans. Inf. Syst., 2004
2003
Balancing performance and flexibility with hardware support for network architectures.
ACM Trans. Comput. Syst., 2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002
Proceedings of the Management Solutions for the New Communications World, 2002
2001
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001
2000
Proceedings of the Active Networks, Second International Working Conference, 2000
Proceedings of the Active Networks, Second International Working Conference, 2000
1999
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999
Proceedings of the Active Networks, First International Working Conference, 1999
Proceedings of the Field-Programmable Logic and Applications, 9th International Workshop, 1999
1998
IEEE Netw., 1998
IEEE Commun. Mag., 1998
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998
Proceedings of the Network and Distributed System Security Symposium, 1998
1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the ACM SIGCOMM 1997 Conference on Applications, 1997
Proceedings of the Field-Programmable Logic and Applications, 7th International Workshop, 1997
1996
IEEE J. Sel. Areas Commun., 1996
State Caching in the EROS Kernel.
Proceedings of the 7th Workshop on Persistent Object Systems, 1996
New Algorithms for Admission Control and Scheduling to Support Multimedia Feedback Remote Control Applications.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996
1995
1994
Proceedings of the Third International Conference on Parallel and Distributed Information Systems (PDIS 94), 1994
Proceedings of the Second ACM International Conference on Multimedia '94, 1994
Proceedings of the Multimedia: Advanced Teleservices and High-Speed Communication Architectures, 1994
1993
IEEE J. Sel. Areas Commun., 1993
Proceedings of the 18th Conference on Local Computer Networks, 1993
1992
An integrated multimedia architecture for high-speed networks (brief extended abstract).
Comput. Commun. Rev., 1992
Proceedings of the Proceedings IEEE INFOCOM '92, 1992
1991
Comput. Networks ISDN Syst., 1991
Proceedings of the Conference on Communications Architecture & Protocols, 1991
Proceedings of the Advances in Cryptology, 1991
1990
ACM SIGOPS Oper. Syst. Rev., 1990
1989
Rapid Location of Mount Points.
Softw. Pract. Exp., 1989
SIGARCH Comput. Archit. News, 1989
Exploring "Multiple Worlds" in Parallel.
Proceedings of the International Conference on Parallel Processing, 1989
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989
Proceedings of the Advances in Cryptology, 1989
1988
Effects of Copy-on-Write Memory Management on the Response Time of UNIX Fork Operations.
Comput. Syst., 1988