James Newsome
  According to our database1,
  James Newsome
  authored at least 26 papers
  between 2003 and 2022.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2022
    Proceedings of the 2022 USENIX Annual Technical Conference, 2022
    
  
  2014
    Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8190-4, 2014
    
  
    Proceedings of the 2014 USENIX Annual Technical Conference, 2014
    
  
  2013
    Proceedings of the Security Protocols XXI, 2013
    
  
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
    
  
    Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
    
  
    Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
    
  
  2012
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
    
  
    Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
    
  
    Proceedings of the IEEE Symposium on Security and Privacy, 2012
    
  
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
    
  
    Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
    
  
  2011
    J. Commun. Networks, 2011
    
  
  2010
    Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
    
  
  2009
    Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009
    
  
  2008
    Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
    
  
    IEEE Trans. Dependable Secur. Comput., 2008
    
  
    Proceedings of the Information Systems Security, 4th International Conference, 2008
    
  
  2007
    Proceedings of the Malware Detection, 2007
    
  
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
    
  
    Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
    
  
    Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007
    
  
  2006
    Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
    
  
    Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
    
  
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
    
  
    Proceedings of the Network and Distributed System Security Symposium, 2006
    
  
    Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
    
  
  2005
    Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
    
  
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    
  
    Proceedings of the Network and Distributed System Security Symposium, 2005
    
  
  2004
    Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004
    
  
  2003
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information.
    
  
    Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003