Follow
Jedidiah Crandall
Jedidiah Crandall
Associate Professor, Arizona State University
Verified email at asu.edu
Title
Cited by
Cited by
Year
Minos: Control data attack prevention orthogonal to memory model
JR Crandall, FT Chong
37th International Symposium on Microarchitecture (MICRO-37'04), 221-232, 2004
6552004
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2532005
ConceptDoppler: a weather tracker for internet censorship.
JR Crandall, D Zinn, M Byrd, ET Barr, R East
CCS 7, 352-365, 2007
1702007
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
T Zhu, D Phipps, A Pridgen, JR Crandall, DS Wallach
USENIX Security Symposium, 227-240, 2013
1632013
Analyzing the great firewall of china over space and time.
R Ensafi, P Winter, A Mueen, JR Crandall
Proc. Priv. Enhancing Technol. 2015 (1), 61-76, 2015
1152015
Temporal search: Detecting hidden malware timebombs with virtual machines
JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong
ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006
1142006
Minos: Architectural support for protecting control data
JR Crandall, SF Wu, FT Chong
ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 359-389, 2006
842006
Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China
JC Park, JR Crandall
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
832010
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
DAS De Oliveira, JR Crandall, G Wassermann, SF Wu, Z Su, FT Chong
Proceedings of the 1st workshop on Architectural and system support for …, 2006
802006
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities
JR Crandall, SF Wu, FT Chong
Detection of Intrusions and Malware, and Vulnerability Assessment: Second …, 2005
762005
Synchroscalar: A multiple clock domain, power-aware, tile-based embedded processor
J Oliver, R Rao, P Sultana, J Crandall, E Czernikowski, LW Jones IV, ...
ACM SIGARCH Computer Architecture News 32 (2), 150, 2004
752004
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
702010
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014
642014
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.
J Knockel, JR Crandall, J Saia
FOCI, 2011
572011
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2015
472015
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
422013
Minos: Architectural support for software security through control data integrity
JR Crandall, F Chong
International Symposium on Microarchitecture 104, 2004
352004
A security assessment of the minos architecture
JR Crandall, FT Chong
ACM SIGARCH Computer Architecture News 33 (1), 48-57, 2005
292005
The ecology of malware
JR Crandall, R Ensafi, S Forrest, J Ladau, B Shebaro
Proceedings of the 2008 New Security Paradigms Workshop, 99-106, 2008
282008
Original SYN: Finding machines hidden behind firewalls
X Zhang, J Knockel, JR Crandall
2015 IEEE Conference on Computer Communications (INFOCOM), 720-728, 2015
272015
The system can't perform the operation now. Try again later.
Articles 1–20