Minos: Control data attack prevention orthogonal to memory model JR Crandall, FT Chong 37th International Symposium on Microarchitecture (MICRO-37'04), 221-232, 2004 | 659 | 2004 |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits JR Crandall, Z Su, SF Wu, FT Chong Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 255 | 2005 |
ConceptDoppler: a weather tracker for internet censorship. JR Crandall, D Zinn, M Byrd, ET Barr, R East CCS 7, 352-365, 2007 | 175 | 2007 |
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. T Zhu, D Phipps, A Pridgen, JR Crandall, DS Wallach USENIX Security Symposium, 227-240, 2013 | 167 | 2013 |
Analyzing the great firewall of china over space and time. R Ensafi, P Winter, A Mueen, JR Crandall Proc. Priv. Enhancing Technol. 2015 (1), 61-76, 2015 | 122 | 2015 |
Temporal search: Detecting hidden malware timebombs with virtual machines JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006 | 117 | 2006 |
Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China JC Park, JR Crandall 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 85 | 2010 |
Minos: Architectural support for protecting control data JR Crandall, SF Wu, FT Chong ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 359-389, 2006 | 84 | 2006 |
ExecRecorder: VM-based full-system replay for attack analysis and system recovery DAS De Oliveira, JR Crandall, G Wassermann, SF Wu, Z Su, FT Chong Proceedings of the 1st workshop on Architectural and system support for …, 2006 | 80 | 2006 |
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities JR Crandall, SF Wu, FT Chong Detection of Intrusions and Malware, and Vulnerability Assessment: Second …, 2005 | 77 | 2005 |
Synchroscalar: A multiple clock domain, power-aware, tile-based embedded processor J Oliver, R Rao, P Sultana, J Crandall, E Czernikowski, LW Jones IV, ... ACM SIGARCH Computer Architecture News 32 (2), 150, 2004 | 75 | 2004 |
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. R Ensafi, JC Park, D Kapur, JR Crandall USENIX Security Symposium, 257-272, 2010 | 71 | 2010 |
Detecting intentional packet drops on the Internet via TCP/IP side channels R Ensafi, J Knockel, G Alexander, JR Crandall Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014 | 64 | 2014 |
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance. J Knockel, JR Crandall, J Saia FOCI, 2011 | 58 | 2011 |
Every rose has its thorn: Censorship and surveillance on social video platforms in china J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall 5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2015 | 48 | 2015 |
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ... First Monday, 2013 | 42 | 2013 |
Minos: Architectural support for software security through control data integrity JR Crandall, F Chong International Symposium on Microarchitecture 104, 2004 | 35 | 2004 |
A security assessment of the minos architecture JR Crandall, FT Chong ACM SIGARCH Computer Architecture News 33 (1), 48-57, 2005 | 29 | 2005 |
We chat, they watch: How international users unwittingly build up WeChat’s Chinese censorship apparatus J Knockel, C Parsons, L Ruan, R Xiong, J Crandall, R Deibert | 28 | 2020 |
The ecology of malware JR Crandall, R Ensafi, S Forrest, J Ladau, B Shebaro Proceedings of the 2008 New Security Paradigms Workshop, 99-106, 2008 | 28 | 2008 |