Jason Franklin

According to our database1, Jason Franklin authored at least 16 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient spatiotemporal interpolation with spark machine learning.
Earth Sci. Informatics, 2019

2012
Parametric Verification of Address Space Separation.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

2011
Challenges and opportunities for efficient computing with FAWN.
ACM SIGOPS Oper. Syst. Rev., 2011

On Adversary Models and Compositional Security.
IEEE Secur. Priv., 2011

FAWN: a fast array of wimpy nodes.
Commun. ACM, 2011

2010
Compositional System Security with Interface-Confined Adversaries.
Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics, 2010

Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Energy-efficient cluster computing with FAWN: workloads and implications.
Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, 2010

2009
A Logic of Secure Systems and its Application to Trusted Computing.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

FAWNdamentally Power-efficient Clusters.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

2008
Towards Sound Detection of Virtual Machines.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

2007
Compatibility Is Not Transparency: VMM Detection Myths and Realities.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

An inquiry into the nature and causes of the wealth of internet miscreants.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Replayer: automatic protocol replay by binary analysis.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Mapping Internet Sensors with Probe Response Attacks.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005


  Loading...