Follow
Jedidiah Crandall
Jedidiah Crandall
Associate Professor, Arizona State University
Verified email at asu.edu
Title
Cited by
Cited by
Year
Minos: Control data attack prevention orthogonal to memory model
JR Crandall, FT Chong
37th International Symposium on Microarchitecture (MICRO-37'04), 221-232, 2004
6432004
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2462005
ConceptDoppler: a weather tracker for internet censorship.
JR Crandall, D Zinn, M Byrd, ET Barr, R East
CCS 7, 352-365, 2007
1692007
The Velocity of Censorship:{High-Fidelity} Detection of Microblog Post Deletions
T Zhu, D Phipps, A Pridgen, JR Crandall, DS Wallach
22nd USENIX Security Symposium (USENIX Security 13), 227-240, 2013
1662013
Analyzing the Great Firewall of China Over Space and Time.
R Ensafi, P Winter, A Mueen, JR Crandall
Proc. Priv. Enhancing Technol. 2015 (1), 61-76, 2015
1102015
Temporal search: Detecting hidden malware timebombs with virtual machines
JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong
ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006
1102006
Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China
JC Park, JR Crandall
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
832010
Minos: Architectural support for protecting control data
JR Crandall, SF Wu, FT Chong
ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 359-389, 2006
812006
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
DAS De Oliveira, JR Crandall, G Wassermann, SF Wu, Z Su, FT Chong
Proceedings of the 1st workshop on Architectural and system support for …, 2006
762006
Synchroscalar: A multiple clock domain, power-aware, tile-based embedded processor
J Oliver, R Rao, P Sultana, J Crandall, E Czernikowski, LW Jones IV, ...
ACM SIGARCH Computer Architecture News 32 (2), 150, 2004
752004
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities
JR Crandall, SF Wu, FT Chong
International Conference on Detection of Intrusions and Malware, and …, 2005
742005
Idle port scanning and non-interference analysis of network protocol stacks using model checking
R Ensafi, JC Park, D Kapur, JR Crandall
19th USENIX Security Symposium (USENIX Security 10), 2010
692010
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
International Conference on Passive and Active Network Measurement, 109-118, 2014
632014
Three Researchers, Five Conjectures: An Empirical Analysis of {TOM-Skype} Censorship and Surveillance
J Knockel, JR Crandall, J Saia
USENIX Workshop on Free and Open Communications on the Internet (FOCI 11), 2011
572011
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
452015
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
442013
Minos: Architectural support for software security through control data integrity
JR Crandall, F Chong
International Symposium on Microarchitecture 104, 2004
352004
A security assessment of the minos architecture
JR Crandall, FT Chong
ACM SIGARCH Computer Architecture News 33 (1), 48-57, 2005
282005
Original SYN: Finding machines hidden behind firewalls
X Zhang, J Knockel, JR Crandall
2015 IEEE Conference on Computer Communications (INFOCOM), 720-728, 2015
262015
{Application-Level} Reconnaissance: Timing Channel Attacks Against Antivirus Software
MI Al-Saleh, JR Crandall
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
262011
The system can't perform the operation now. Try again later.
Articles 1–20