Justin Cappos

Orcid: 0000-0003-1926-8544

According to our database1, Justin Cappos authored at least 79 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards verifiable web-based code review systems.
J. Comput. Secur., 2023

Multitenant Containers as a Service (CaaS) for Clouds and Edge Clouds.
IEEE Access, 2023

Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Cybersecurity Shuffle: Using Card Magic to Introduce Cybersecurity Concepts.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Bootstrapping Trust in Community Repository Projects.
Proceedings of the Security and Privacy in Communication Networks, 2022

Federating EdgeNet with Fed4FIRE+ and Deploying its Nodes Behind NATs.
Proceedings of the IFIP Networking Conference, 2022

Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings.
Proceedings of the 17th International Conference on Software Technologies, 2022

Demo: EdgeNet, a Production Internet-Scale Container-Based Distributed System Testbed.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
EdgeNet: the Global Kubernetes Cluster Testbed.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

EdgeNet: A Multi-Tenant and Multi-Provider Edge Cloud.
Proceedings of the EdgeSys@EuroSys 2021: 4th International Workshop on Edge Systems, 2021

2020
Towards adding verifiability to web-based Git repositories.
J. Comput. Secur., 2020

Thinking aloud about confusing code: a qualitative investigation of program comprehension and atoms of confusion.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

MicroCash: Practical Concurrent Processing of Micropayments.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
in-toto: Providing farm-to-table guarantees for bits and bytes.
Proceedings of the 28th USENIX Security Symposium, 2019

Commit Signatures for Centralized Version Control Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Charting a Course Through Uncertain Environments: SEA Uses Past Problems to Avoid Future Failures.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

ABC: A Cryptocurrency-Focused Threat Modeling Framework.
Proceedings of the IEEE INFOCOM 2019, 2019

CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Uptane: Security and Customizability of Software Updates for Vehicles.
IEEE Veh. Technol. Mag., 2018

Tsumiki: A Meta-Platform for Building Your Own Testbed.
IEEE Trans. Parallel Distributed Syst., 2018

Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

API Blindspots: Why Experienced Developers Write Vulnerable Code.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Four years experience: Making sensibility testbed work for SAS.
Proceedings of the 2018 IEEE Sensors Applications Symposium, 2018

Design of activity recognition systems with wearable sensors.
Proceedings of the 2018 IEEE Sensors Applications Symposium, 2018

Prevalence of confusing code in software projects: atoms of confusion in the wild.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

EdgeNet: A Global Cloud That Spreads by Local Action.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

le-git-imate: Towards Verifiable Web-based Git Repositories.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Securing Software Updates for Automotives Using Uptane.
login Usenix Mag., 2017

User Anonymity on Twitter.
IEEE Secur. Priv., 2017

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.
IACR Cryptol. ePrint Arch., 2017

Mining Anonymity: Identifying Sensitive Accounts on Twitter.
CoRR, 2017

Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Understanding misunderstandings in source code.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Practical fog computing with seattle.
Proceedings of the IEEE Fog World Congress, 2017

2016
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities.
Proceedings of the 25th USENIX Security Symposium, 2016

Diplomat: Using Delegations to Protect Community Repositories.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

2015
Privacy-Preserving Experimentation with Sensibility Testbed.
login Usenix Mag., 2015

Selectively Taming Background Android Apps to Improve Battery Lifetime.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Fence: Protecting Device Availability With Uniform Resource Control.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Trust Evaluation in Mobile Devices: An Empirical Study.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Teaching Security Using Hands-on Exercises in 2015 (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Can the Security Mindset Make Students Better Testers?
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

A first look at vehicle data collection via smartphone sensors.
Proceedings of the IEEE Sensors Applications Symposium, 2015

Detecting latent cross-platform API violations.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

A Fast Multi-Server, Multi-Block Private Information Retrieval Protocol.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
PolyPasswordHasher: Improving Password Storage Security.
login Usenix Mag., 2014

ToMaTo a Virtual Research Environment for Large Scale Distributed Systems Research.
Prax. Inf.verarb. Kommun., 2014

Teaching security using hands-on exercises (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Teaching the security mindset with reference monitors.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

BlurSense: Dynamic fine-grained access control for smartphone privacy.
Proceedings of the IEEE Sensors Applications Symposium, 2014

Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

NetCheck: Network Diagnoses from Blackbox Traces.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

Sensibility testbed: An internet-wide cloud platform for programmable exploration of mobile devices.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

"On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks.
Proceedings of the second ACM conference on Online social networks, 2014

It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Sensorium - A Generic Sensor Framework.
Prax. Inf.verarb. Kommun., 2013

Experience with Seattle: A Community Platform for Research and Education.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates.
Proceedings of the Financial Cryptography and Data Security, 2013

2011
Et (smart) phone home!
Proceedings of the SPLASH'11 Workshops, 2011

2010
Model-based Testing Without a Model: Assessing Portability in the Seattle Testbed.
Proceedings of the 5th International Workshop on Systems Software Verification, 2010

Survivable key compromise in software update systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Retaining sandbox containment despite bugs in privileged memory-safe code.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Package Managers Still Vulnerable: How to Protect Your Systems.
login Usenix Mag., 2009

Simultaneous graph embedding with bends and circular arcs.
Comput. Geom., 2009

Seattle: a platform for educational cloud computing.
Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, 2009

Rhizoma: A Runtime for Self-deploying, Self-managing Overlays.
Proceedings of the Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30, 2009

2008
Stork: Secure Package Management for VM Environments.
PhD thesis, 2008

Centralized Package Management Using Stork.
login Usenix Mag., 2008

San Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Dependable Self-Hosting Distributed Systems Using Constraints.
Proceedings of the Fourth Workshop on Hot Topics in System Dependability, 2008

A look in the mirror: attacks on package managers.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Net-X: Unified Data-Centric Internet Services.
Proceedings of the Third International Workshop on Networking Meets Databases, 2007

Stork: Package Management for Distributed VM Environments.
Proceedings of the 21th Large Installation System Administration Conference, 2007

2006
Privileged operations in the PlanetLab virtualised environment.
ACM SIGOPS Oper. Syst. Rev., 2006

2005
Proper: Privileged Operations in a Virtualised System Environment.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

Collaboration with DiamondTouch.
Proceedings of the Human-Computer Interaction, 2005

Why It Is Hard to Build a Long-Running Service on PlanetLab.
Proceedings of the Second USENIX Workshop on Real, Large Distributed Systems, 2005


  Loading...