Jedidiah R. Crandall

Orcid: 0000-0001-7864-2992

Affiliations:
  • University of New Mexico, USA
  • University of California, Davis, USA


According to our database1, Jedidiah R. Crandall authored at least 65 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking.
ACM Comput. Surv., 2023

2022
OpenVPN is Open to VPN Fingerprinting.
Proceedings of the 31st USENIX Security Symposium, 2022

TSPU: Russia's decentralized censorship system.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
Blind In/On-Path Attacks and Applications to VPNs.
Proceedings of the 30th USENIX Security Symposium, 2021

Context-Aware Privacy-Optimizing Address Tracing.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

2020
The Program with a Personality: Analysis of Elk Cloner, the First Personal Computer Virus.
CoRR, 2020

MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Detecting TCP/IP Connections via IPID Hash Collisions.
Proc. Priv. Enhancing Technol., 2019

Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
CoRR, 2019

Borders and gateways: measuring and analyzing national as chokepoints.
Proceedings of the Conference on Computing & Sustainable Societies, 2019

2018
Tracking Elections: our experience during the presidential elections in Ecuador.
CoRR, 2018

When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users.
CoRR, 2018

ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PIITracker: Automatic Tracking of Personally Identifiable Information in Windows.
Proceedings of the 11th European Workshop on Systems Security, 2018

FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

TorBricks: Blocking-Resistant Tor Bridge Distribution.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

2016
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

High Fidelity Off-Path Round-Trip Time Measurement via TCP/IP Side Channels with Duplicate SYNs.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Analyzing the Great Firewall of China Over Space and Time.
Proc. Priv. Enhancing Technol., 2015

Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015

Original SYN: Finding machines hidden behind firewalls.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Off-path round trip time measurement via TCP/IP side channels.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall.
CoRR, 2014

Counting Packets Sent Between Arbitrary Internet Hosts.
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

A Case Study in Helping Students to Covertly Eat Their Classmates.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Technical Foundations of Information Systems Security.
Proceedings of the Computing Handbook, 2014

2013
Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels.
Int. J. Digit. Crime Forensics, 2013

Antivirus performance characterisation: system-wide view.
IET Inf. Secur., 2013

Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC.
First Monday, 2013

Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version.
CoRR, 2013

The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint.
login Usenix Mag., 2012

Tracking and Quantifying Censorship on a Chinese Microblogging Site
CoRR, 2012

A Pointillism Approach for Natural Language Processing of Social Media
CoRR, 2012

Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Language without words: A pointillist model for natural language processing.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries.
Proceedings of the New Security Paradigms Workshop, 2012

2011
Privacy-preserving network flow recording.
Digit. Investig., 2011

Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011

Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

2010
Leaving timing-channel fingerprints in hidden service log files.
Digit. Investig., 2010

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Proceedings of the 19th USENIX Security Symposium, 2010

On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Trans. Comput. Sci., 2009

Architectural Support for Securing Sensor Networks Against Remote Attacks.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009

2008
The ecology of Malware.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
Proceedings of the Information Security, 11th International Conference, 2008

2007
ConceptDoppler: a weather tracker for internet censorship.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Minos: Architectural support for protecting control data.
ACM Trans. Archit. Code Optim., 2006

ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

Temporal search: detecting hidden malware timebombs with virtual machines.
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006

2005
A security assessment of the minos architecture.
SIGARCH Comput. Archit. News, 2005

Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2005

On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Minos: Control Data Attack Prevention Orthogonal to Memory Model.
Proceedings of the 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 2004

Synchroscalar: A Multiple Clock Domain, Power-Aware, Tile-Based Embedded Processor.
Proceedings of the 31st International Symposium on Computer Architecture (ISCA 2004), 2004

2003
Synchroscalar: Initial Lessons in Power-Aware Design of a Tile-Based Embedded Architecture.
Proceedings of the Power-Aware Computer Systems, Third International Workshop, 2003


  Loading...