Follow
Jared M. Smith
Jared M. Smith
SecurityScorecard, NYU, UT-K
Verified email at securityscorecard.io - Homepage
Title
Cited by
Cited by
Year
Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing
JM Smith, M Schuchard
39th IEEE Symposium on Security and Privacy (IEEE S&P), 2018
912018
PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems
RJ Connor, T McDaniel, JM Smith, M Schuchard
USENIX Security, 2020
532020
Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems
RA Awad, S Beztchi, JM Smith, B Lyles, S Prowell
4th Annual Industrial Control System Security Workshop (ICSS), 1-8, 2018
392018
Overshadow PLC to detect remote control-logic injection attacks
H Yoo, S Kalle, J Smith, I Ahmed
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA …, 2019
352019
Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements
JM Smith, K Birkeland, T McDaniel, M Schuchard
Network and Distributed Systems Security Symposium (NDSS), 2020
34*2020
Control logic forensics framework using built-in decompiler of engineering software in industrial control systems
SA Qasim, JM Smith, I Ahmed
Forensic Science International: Digital Investigation 33, 301013, 2020
312020
Towards Architecture and OS-Independent Malware Detection via Memory Forensics
R Petrik, B Arik, JM Smith
ACM Computer and Communications Security (CCS), 2267-2269, 2018
212018
Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis
T McDaniel, JM Smith, M Schuchard
Network and Distributed Systems Security Symposium (NDSS), 2021
122021
Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware Detectors
RA Bridges, S Oesch, MD Iannacone, KMT Huffer, B Jewell, JA Nichols, ...
Digital Threats: Research and Practice 4 (2), 1-22, 2023
9*2023
The Impact of Analog Computational Error on an Analog Boolean Satisfiability Solver
DA Basford, JM Smith, RJ Connor, BJ MacLennan, J Holleman
38th International Symposium on Circuits and Systems (ISCAS), 2016
9*2016
An assessment of the usability of machine learning based tools for the security operations center
S Oesch, R Bridges, J Smith, J Beaver, J Goodall, K Huffer, C Miles, ...
2020 International Conferences on Internet of Things (iThings) and IEEE …, 2020
82020
Crowdsourcing the discovery of software repositories in an educational environment
Y Ma, T Dey, JM Smith, N Wilder, A Mockus
PeerJ Preprints, 2016
82016
Exploring a Framework for Identity and Attribute Linking Across Heterogeneous Data Systems
N Wilder, JM Smith, A Mockus
2nd International Workshop on Big Data Software Engineering, 19-25, 2016
7*2016
Akatosh: Automated Cyber Incident Verification and Impact Analysis
JM Smith, ED Greenlee, AE Ferber
ACM SIGSAC Conference on Computer and Communications Security, 2463-2465, 2017
52017
The Maestro Attack: Orchestrating Malicious Flows with BGP
T McDaniel, JM Smith, M Schuchard
SecureComm, 2020
32020
AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors
RA Bridges, B Weber, JM Beaver, JM Smith, ME Verma, S Norem, ...
2023 IEEE International Conference on Big Data (BigData), 1620-1629, 2023
12023
Virtual supervisory control and data acquisition (SCADA) automation controller
JM Smith, JA Johnson, B Weber, CR Hathhorn, BT McDaniel
US Patent 11,671,320, 2023
12023
Measuring Irregular Geographic Exposure on the Internet
J Holland, J Smith, M Schuchard
arXiv preprint arXiv:1904.09375, 2019
12019
Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors
J Holland, RJ Connor, JP Diamond, JM Smith, M Schuchard
Proceedings of the 22nd International Financial Cryptography and Data …, 2018
12018
MS Thesis: Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing
JM Smith
University of Tennessee, Knoxville, 2017
1*2017
The system can't perform the operation now. Try again later.
Articles 1–20