Joshua Schiffman

According to our database1, Joshua Schiffman authored at least 25 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Symbolon: Enabling Flexible Multi-device-based User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2015
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
The SMM Rootkit Revisited: Fun with USB.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Cloud Verifier: Verifiable Auditing Service for IaaS Clouds.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Shroud: ensuring private access to large-scale data in the data center.
Proceedings of the 11th USENIX conference on File and Storage Technologies, 2013

Process firewalls: protecting processes during resource access.
Proceedings of the Eighth Eurosys Conference 2013, 2013

2012
Scalable Web Content Attestation.
IEEE Trans. Computers, 2012

Toward Practical Private Access to Data Centers via Parallel ORAM.
IACR Cryptol. ePrint Arch., 2012

STING: Finding Name Resolution Vulnerabilities in Programs.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Verifying System Integrity by Proxy.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Integrity walls: finding attack surfaces from mandatory access control policies.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Protecting the integrity of trusted applications in mobile phone systems.
Secur. Commun. Networks, 2011

Network-Based Root of Trust for Installation.
IEEE Secur. Priv., 2011

A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

2010
Outlook: Cloudy with a Chance of Security Challenges and Improvements.
IEEE Secur. Priv., 2010

An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers.
Proceedings of the POLICY 2010, 2010

Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010

Seeding clouds with trust anchors.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Securing elastic applications on mobile devices for cloud computing.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Justifying Integrity Using a Virtual Machine Verifier.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Measuring integrity on mobile phone systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

2007
Protecting users from "themselves".
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Establishing and Sustaining System Integrity via Root of Trust Installation.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007


  Loading...