2009 |
13 | EE | Jedidiah R. Crandall,
John Brevik,
Shaozhi Ye,
Gary Wassermann,
Daniela A. S. de Oliveira,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Transactions on Computational Science 4: 244-262 (2009) |
2008 |
12 | EE | Ryan Iwahashi,
Daniela A. S. de Oliveira,
Shyhtsun Felix Wu,
Jedidiah R. Crandall,
Young-Jun Heo,
Jin-Tae Oh,
Jong-Soo Jang:
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
ISC 2008: 114-130 |
11 | EE | Daniela A. S. de Oliveira,
Jedidiah R. Crandall,
Gary Wassermann,
Shaozhi Ye,
Shyhtsun Felix Wu,
Zhendong Su,
Frederic T. Chong:
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
NOMS 2008: 121-128 |
2007 |
10 | EE | Jedidiah R. Crandall,
Daniel Zinn,
Michael Byrd,
Earl Barr,
Rich East:
ConceptDoppler: a weather tracker for internet censorship.
ACM Conference on Computer and Communications Security 2007: 352-365 |
2006 |
9 | EE | Daniela A. S. de Oliveira,
Jedidiah R. Crandall,
Gary Wassermann,
Shyhtsun Felix Wu,
Zhendong Su,
Frederic T. Chong:
ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
ASID 2006: 66-71 |
8 | EE | Jedidiah R. Crandall,
Gary Wassermann,
Daniela A. S. de Oliveira,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
Temporal search: detecting hidden malware timebombs with virtual machines.
ASPLOS 2006: 25-36 |
7 | EE | Jedidiah R. Crandall,
Shyhtsun Felix Wu,
Frederic T. Chong:
Minos: Architectural support for protecting control data.
TACO 3(4): 359-389 (2006) |
2005 |
6 | EE | Jedidiah R. Crandall,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
ACM Conference on Computer and Communications Security 2005: 235-248 |
5 | EE | Jedidiah R. Crandall,
Shyhtsun Felix Wu,
Frederic T. Chong:
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities.
DIMVA 2005: 32-50 |
4 | EE | Jedidiah R. Crandall,
Frederic T. Chong:
A security assessment of the minos architecture.
SIGARCH Computer Architecture News 33(1): 48-57 (2005) |
2004 |
3 | EE | John Oliver,
Ravishankar Rao,
Paul Sultana,
Jedidiah R. Crandall,
Erik Czernikowski,
Leslie W. Jones IV,
Diana Franklin,
Venkatesh Akella,
Frederic T. Chong:
Synchroscalar: A Multiple Clock Domain, Power-Aware, Tile-Based Embedded Processor.
ISCA 2004: 150-161 |
2 | EE | Jedidiah R. Crandall,
Frederic T. Chong:
Minos: Control Data Attack Prevention Orthogonal to Memory Model.
MICRO 2004: 221-232 |
2003 |
1 | EE | John Oliver,
Ravishankar Rao,
Paul Sultana,
Jedidiah R. Crandall,
Erik Czernikowski,
Leslie W. Jones IV,
Dean Copsey,
Diana Keen,
Venkatesh Akella,
Frederic T. Chong:
Synchroscalar: Initial Lessons in Power-Aware Design of a Tile-Based Embedded Architecture.
PACS 2003: 73-85 |