Jedidiah R. Crandall

According to our database1, Jedidiah R. Crandall authored at least 47 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PIITracker: Automatic Tracking of Personally Identifiable Information in Windows.
Proceedings of the 11th European Workshop on Systems Security, 2018

FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

TorBricks: Blocking-Resistant Tor Bridge Distribution.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

High Fidelity Off-Path Round-Trip Time Measurement via TCP/IP Side Channels with Duplicate SYNs.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Analyzing the Great Firewall of China Over Space and Time.
PoPETs, 2015

Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015

Original SYN: Finding machines hidden behind firewalls.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Off-path round trip time measurement via TCP/IP side channels.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Counting Packets Sent Between Arbitrary Internet Hosts.
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

A Case Study in Helping Students to Covertly Eat Their Classmates.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Technical Foundations of Information Systems Security.
Proceedings of the Computing Handbook, 2014

Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels.
IJDCF, 2013

Antivirus performance characterisation: system-wide view.
IET Information Security, 2013

Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC.
First Monday, 2013

The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint.
;login:, 2012

Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Language without words: A pointillist model for natural language processing.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries.
Proceedings of the New Security Paradigms Workshop, 2012

Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet, 2011

Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Proceedings of the 19th USENIX Security Symposium, 2010

On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Trans. Computational Science, 2009

Architectural Support for Securing Sensor Networks Against Remote Attacks.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009

The ecology of Malware.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
Proceedings of the Information Security, 11th International Conference, 2008

ConceptDoppler: a weather tracker for internet censorship.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Minos: Architectural support for protecting control data.
TACO, 2006

ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

Temporal search: detecting hidden malware timebombs with virtual machines.
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006

A security assessment of the minos architecture.
SIGARCH Computer Architecture News, 2005

Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2005

On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Minos: Control Data Attack Prevention Orthogonal to Memory Model.
Proceedings of the 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 2004

Synchroscalar: A Multiple Clock Domain, Power-Aware, Tile-Based Embedded Processor.
Proceedings of the 31st International Symposium on Computer Architecture (ISCA 2004), 2004

Synchroscalar: Initial Lessons in Power-Aware Design of a Tile-Based Embedded Architecture.
Proceedings of the Power-Aware Computer Systems, Third International Workshop, 2003