James Newsome

According to our database1, James Newsome authored at least 26 papers between 2003 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Co-opting Linux Processes for High-Performance Network Simulation.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

2014
Trustworthy Execution on Mobile Devices.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8190-4, 2014

MiniBox: A Two-Way Sandbox for x86 Native Code.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

2013
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets.
Proceedings of the Security Protocols XXI, 2013

Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Building Verifiable Trusted Path on Commodity x86 Computers.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Access right assignment mechanisms for secure home networks.
J. Commun. Networks, 2011

2010
Challenges in Access Right Assignment for Secure Home Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

2009
Measuring channel capacity to distinguish undue influence.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

2008
Automatically Identifying Trigger-based Behavior in Malware.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Secur. Comput., 2008

BitBlaze: A New Approach to Computer Security via Binary Analysis.
Proceedings of the Information Systems Security, 4th International Conference, 2008

2007
Sting: An End-to-End Self-Healing System for Defending against Internet Worms.
Proceedings of the Malware Detection, 2007

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Sweeper: a lightweight end-to-end system for defending against fast worms.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

2006
Towards Automatic Generation of Vulnerability-Based Signatures.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Paragraph: Thwarting Signature Learning by Training Maliciously.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2006

Replayer: automatic protocol replay by binary analysis.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Polygraph: Automatically Generating Signatures for Polymorphic Worms.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2005

2004
The sybil attack in sensor networks: analysis & defenses.
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004

2003
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003


  Loading...