Παρακολούθηση
James Newsome
James Newsome
Άγνωστη συνεργασία
Μη επαληθευμένη διεύθυνση ηλ. ταχυδρομείου
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
J Newsome, DX Song
NDSS 5, 3-4, 2005
24152005
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Proceedings of the 3rd international symposium on Information processing in …, 2004
21622004
Polygraph: Automatically generating signatures for polymorphic worms
J Newsome, B Karp, D Song
2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005
12572005
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10762008
GEM: Graph embedding for routing and data-centric storage in sensor networks without geographic information
J Newsome, D Song
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
4372003
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
4132006
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection: Countering the Largest Security Threat, 65-88, 2008
3362008
Paragraph: Thwarting signature learning by training maliciously
J Newsome, B Karp, D Song
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
3082006
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
1892012
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1782013
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
D Brumley, J Caballero, Z Liang, J Newsome, D Song
USENIX Security Symposium 15, 2007
1632007
Replayer: Automatic protocol replay by binary analysis
J Newsome, D Brumley, J Franklin, D Song
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1582006
{MiniBox}: A {Two-Way} Sandbox for x86 Native Code
Y Li, J McCune, J Newsome, A Perrig, B Baker, W Drewry
2014 USENIX annual technical conference (USENIX ATC 14), 409-420, 2014
1432014
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
J Newsome, D Brumley, D Song, J Chamcham, X Kovah
NDSS, 2006
1412006
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
1182007
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
1082012
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms
E Owusu, J Guajardo, J McCune, J Newsome, A Perrig, A Vasudevan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1042013
Measuring channel capacity to distinguish undue influence
J Newsome, S McCamant, D Song
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
1042009
Sweeper: A lightweight end-to-end system for defending against fast worms
J Tucek, J Newsome, S Lu, C Huang, S Xanthos, D Brumley, Y Zhou, ...
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer …, 2007
922007
Systems and methods for maintaining integrity and secrecy in untrusted computing platforms
JG Merchan, EK Owusu, JMC McCune, JD Newsome, A Vasudevan, ...
US Patent 9,367,701, 2016
822016
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20