James W. Mickens

Orcid: 0009-0007-7296-5185

Affiliations:
  • Harvard University, Cambridge, MA, USA
  • Microsoft Research (former)
  • University of Michigan, Electrical and Computer Engineering Division, Ann Arbor, MI, USA (former)


According to our database1, James W. Mickens authored at least 54 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SmartNIC Security Isolation in the Cloud with S-NIC.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
Holepunch: Fast, Secure File Deletion with Crash Consistency.
IACR Cryptol. ePrint Arch., 2023

Splice: Efficiently Removing a User's Data from In-memory Application State.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Carbink: Fault-Tolerant Far Memory.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

2021
SIGL: Securing Software Installations Through Deep Graph Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

Identifying Valuable Pointers in Heap Data.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Oblique: Accelerating Page Loads Using Symbolic Execution.
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021

2020
Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Xanthus: Push-button Orchestration of Host Provenance Data Collection.
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2020

Rethinking Isolation Mechanisms for Datacenter Multitenancy.
Proceedings of the 12th USENIX Workshop on Hot Topics in Cloud Computing, 2020

2019
Riverbed: Enforcing User-defined Privacy Constraints in Distributed Web Services.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

WatchTower: Fast, Secure Mobile Page Loads Using Remote Dependency Resolution.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Reverb: Speculative Debugging for Web Applications.
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019

2018
McFly: Time-Travel Debugging for the Web.
CoRR, 2018

Remote-Control Caching: Proxy-based URL Rewriting to Decrease Mobile Browsing Bandwidth.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

Alto: lightweight VMs using virtualization-aware managed runtimes.
Proceedings of the 15th International Conference on Managed Languages & Runtimes, 2018

Vesper: Measuring Time-to-Interactivity for Web Pages.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

Prophecy: Accelerating Mobile Page Loads Using Final-state Write Logs.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

Veil: Private Browsing Semantics Without Browser-side Assistance.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

DeadBolt: Securing IoT Deployments.
Proceedings of the Applied Networking Research Workshop, 2018

2017
Cobweb: Practical Remote Attestation Using Contextual Graphs.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

2016
Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Polaris: Faster Page Loads Using Fine-grained Dependency Tracking.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2015
Mahimahi: Accurate Record-and-Replay for HTTP.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Amber: Decoupling User Data from Web Applications.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Domino: understanding wide-area, asynchronous event causality in web applications.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

Mjölnir: The Magical Web Application Hammer.
Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015

2014
The Saddest Moment.
login Usenix Mag., 2014

Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious Applications.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

2013
Shroud: ensuring private access to large-scale data in the data center.
Proceedings of the 11th USENIX conference on File and Storage Technologies, 2013

2012
Toward Practical Private Access to Data Centers via Parallel ORAM.
IACR Cryptol. ePrint Arch., 2012

Jigsaw: Efficient, Low-effort Mashup Isolation.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

Gibraltar: Exposing Hardware Devices to Web Pages Using AJAX.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

Rivet: Browser-agnostic Remote Debugging for Web Applications.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

2011
Memoir: Practical State Continuity for Protected Modules.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Atlantis: robust, extensible execution environments for web applications.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

2010
Silo: Exploiting JavaScript and DOM Storage for Faster Page Loads.
Proceedings of the USENIX Conference on Web Application Development, 2010

Crom: Faster Web Browsing Using Speculative Execution.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Mugshot: Deterministic Capture and Replay for JavaScript Applications.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Collaborative Measurements of Upload Speeds in P2P Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
SOSP diversity workshop.
ACM SIGOPS Oper. Syst. Rev., 2009

StrobeLight: Lightweight Availability Mapping and Anomaly Detection.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Brief announcement: collaborative measurement of upload speeds in P2P systems.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

ThunderDome: discovering upload constraints using decentralized bandwidth tournaments.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Exploiting Host Availability in Distributed Systems.
PhD thesis, 2008

2007
Analytical Models for Epidemics in Mobile Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Concilium: Collaborative Diagnosis of Broken Overlay Routes.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Improving distributed system performance using machine availability prediction.
SIGMETRICS Perform. Evaluation Rev., 2006

Exploiting Availability Prediction in Distributed Systems.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

2005
Modeling epidemic spreading in mobile environments.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Predicting node availability in peer-to-peer networks.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

2004
Using Delay to Defend Against Database Extraction.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

2003
MobiSys 2003: On the Cutting Edge in San Francisco.
IEEE Pervasive Comput., 2003


  Loading...