default search action
BibTeX records: James Newsome
@inproceedings{DBLP:conf/usenix/JansenNW22, author = {Rob Jansen and James Newsome and Ryan Wails}, editor = {Jiri Schindler and Noa Zilberman}, title = {Co-opting Linux Processes for High-Performance Network Simulation}, booktitle = {Proceedings of the 2022 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2022, Carlsbad, CA, USA, July 11-13, 2022}, pages = {327--350}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/atc22/presentation/jansen}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/JansenNW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/VasudevanMN14, author = {Amit Vasudevan and Jonathan M. McCune and James Newsome}, title = {Trustworthy Execution on Mobile Devices}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-8190-4}, doi = {10.1007/978-1-4614-8190-4}, isbn = {978-1-4614-8189-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/VasudevanMN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/LiMNPBD14, author = {Yanlin Li and Jonathan M. McCune and James Newsome and Adrian Perrig and Brandon Baker and Will Drewry}, editor = {Garth Gibson and Nickolai Zeldovich}, title = {MiniBox: {A} Two-Way Sandbox for x86 Native Code}, booktitle = {Proceedings of the 2014 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2014, Philadelphia, PA, USA, June 19-20, 2014}, pages = {409--420}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/atc14/technical-sessions/presentation/li\_yanlin}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/LiMNPBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OwusuGMNPV13, author = {Emmanuel Owusu and Jorge Guajardo and Jonathan M. McCune and James Newsome and Adrian Perrig and Amit Vasudevan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{OASIS:} on achieving a sanctuary for integrity and secrecy on untrusted platforms}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {13--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516678}, doi = {10.1145/2508859.2516678}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OwusuGMNPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VasudevanCJMND13, author = {Amit Vasudevan and Sagar Chaki and Limin Jia and Jonathan M. McCune and James Newsome and Anupam Datta}, title = {Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {430--444}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.36}, doi = {10.1109/SP.2013.36}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/VasudevanCJMND13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ZhaoGPN13, author = {Jun Zhao and Virgil D. Gligor and Adrian Perrig and James Newsome}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {94--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_12}, doi = {10.1007/978-3-642-41717-7\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/ZhaoGPN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasudevanMNPD12, author = {Amit Vasudevan and Jonathan M. McCune and James Newsome and Adrian Perrig and Leendert van Doorn}, editor = {Heung Youl Youm and Yoojae Won}, title = {{CARMA:} a hardware tamper-resistant isolated execution environment on commodity x86 platforms}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {48--49}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414484}, doi = {10.1145/2414456.2414484}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VasudevanMNPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhouGNM12, author = {Zongwei Zhou and Virgil D. Gligor and James Newsome and Jonathan M. McCune}, title = {Building Verifiable Trusted Path on Commodity x86 Computers}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {616--630}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.42}, doi = {10.1109/SP.2012.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhouGNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/VasudevanOZNM12, author = {Amit Vasudevan and Emmanuel Owusu and Zongwei Zhou and James Newsome and Jonathan M. McCune}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {159--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_10}, doi = {10.1007/978-3-642-30921-2\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/VasudevanOZNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/KimBNPW11, author = {Tiffany Hyun{-}Jin Kim and Lujo Bauer and James Newsome and Adrian Perrig and Jesse Walker}, title = {Access right assignment mechanisms for secure home networks}, journal = {J. Commun. Networks}, volume = {13}, number = {2}, pages = {175--186}, year = {2011}, url = {https://doi.org/10.1109/JCN.2011.6157417}, doi = {10.1109/JCN.2011.6157417}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/KimBNPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KimBNPW10, author = {Tiffany Hyun{-}Jin Kim and Lujo Bauer and James Newsome and Adrian Perrig and Jesse Walker}, editor = {Wietse Z. Venema}, title = {Challenges in Access Right Assignment for Secure Home Networks}, booktitle = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/hotsec10/challenges-access-right-assignment-secure-home-networks}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/KimBNPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/NewsomeMS09, author = {James Newsome and Stephen McCamant and Dawn Song}, editor = {Stephen Chong and David A. Naumann}, title = {Measuring channel capacity to distinguish undue influence}, booktitle = {Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, {PLAS} 2009, Dublin, Ireland, 15-21 June, 2009}, pages = {73--85}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1554339.1554349}, doi = {10.1145/1554339.1554349}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/pldi/NewsomeMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrumleyNSWJ08, author = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha}, title = {Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.55}, doi = {10.1109/TDSC.2008.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08, author = {Dawn Xiaodong Song and David Brumley and Heng Yin and Juan Caballero and Ivan Jager and Min Gyung Kang and Zhenkai Liang and James Newsome and Pongsin Poosankam and Prateek Saxena}, editor = {R. Sekar and Arun K. Pujari}, title = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {1--25}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_1}, doi = {10.1007/978-3-540-89862-7\_1}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SongBYCJKLNPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BrumleyHLNSY08, author = {David Brumley and Cody Hartwig and Zhenkai Liang and James Newsome and Dawn Xiaodong Song and Heng Yin}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Automatically Identifying Trigger-based Behavior in Malware}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {65--88}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_4}, doi = {10.1007/978-0-387-68768-1\_4}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/BrumleyHLNSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/TucekNLHXBZS07, author = {Joseph A. Tucek and James Newsome and Shan Lu and Chengdu Huang and Spiros Xanthos and David Brumley and Yuanyuan Zhou and Dawn Xiaodong Song}, editor = {Paulo Ferreira and Thomas R. Gross and Lu{\'{\i}}s Veiga}, title = {Sweeper: a lightweight end-to-end system for defending against fast worms}, booktitle = {Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007}, pages = {115--128}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1272996.1273010}, doi = {10.1145/1272996.1273010}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/TucekNLHXBZS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrumleyCLN07, author = {David Brumley and Juan Caballero and Zhenkai Liang and James Newsome}, editor = {Niels Provos}, title = {Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation}, booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA, August 6-10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/16th-usenix-security-symposium/towards-automatic-discovery-deviations-binary}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/BrumleyCLN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BrumleyNS07, author = {David Brumley and James Newsome and Dawn Song}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Sting: An End-to-End Self-Healing System for Defending against Internet Worms}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {147--170}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_7}, doi = {10.1007/978-0-387-44599-1\_7}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/BrumleyNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NewsomeBFS06, author = {James Newsome and David Brumley and Jason Franklin and Dawn Xiaodong Song}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Replayer: automatic protocol replay by binary analysis}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {311--321}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180444}, doi = {10.1145/1180405.1180444}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NewsomeBFS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NewsomeBSCK06, author = {James Newsome and David Brumley and Dawn Xiaodong Song}, title = {Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/vulnerability-specific-execution-filtering-exploit-prevention-commodity-software/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NewsomeBSCK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NewsomeKS06, author = {James Newsome and Brad Karp and Dawn Xiaodong Song}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Paragraph: Thwarting Signature Learning by Training Maliciously}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {81--105}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_5}, doi = {10.1007/11856214\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/NewsomeKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06, author = {David Brumley and James Newsome and Dawn Xiaodong Song and Hao Wang and Somesh Jha}, title = {Towards Automatic Generation of Vulnerability-Based Signatures}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {2--16}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.41}, doi = {10.1109/SP.2006.41}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NewsomeS05, author = {James Newsome and Dawn Xiaodong Song}, title = {Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2005, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2005}, url = {https://www.ndss-symposium.org/ndss2005/dynamic-taint-analysis-automatic-detection-analysis-and-signaturegeneration-exploits-commodity/}, timestamp = {Mon, 01 Feb 2021 08:42:12 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NewsomeS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NewsomeKS05, author = {James Newsome and Brad Karp and Dawn Xiaodong Song}, title = {Polygraph: Automatically Generating Signatures for Polymorphic Worms}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {226--241}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.15}, doi = {10.1109/SP.2005.15}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/NewsomeKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/NewsomeSSP04, author = {James Newsome and Elaine Shi and Dawn Xiaodong Song and Adrian Perrig}, editor = {Kannan Ramchandran and Janos Sztipanovits and Jennifer C. Hou and Thrasyvoulos N. Pappas}, title = {The sybil attack in sensor networks: analysis {\&} defenses}, booktitle = {Proceedings of the Third International Symposium on Information Processing in Sensor Networks, {IPSN} 2004, Berkeley, California, USA, April 26-27, 2004}, pages = {259--268}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/984622.984660}, doi = {10.1145/984622.984660}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ipsn/NewsomeSSP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/NewsomeS03, author = {James Newsome and Dawn Xiaodong Song}, editor = {Ian F. Akyildiz and Deborah Estrin and David E. Culler and Mani B. Srivastava}, title = {{GEM:} graph eMbedding for routing and data-centric storage in sensor networks without geographic information}, booktitle = {Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003}, pages = {76--88}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/958491.958501}, doi = {10.1145/958491.958501}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/NewsomeS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.