Jedidiah Crandall
Jedidiah Crandall
Associate Professor, Arizona State University
Verified email at
Cited by
Cited by
Minos: Control data attack prevention orthogonal to memory model
JR Crandall, FT Chong
37th International Symposium on Microarchitecture (MICRO-37'04), 221-232, 2004
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
ConceptDoppler: a weather tracker for internet censorship.
JR Crandall, D Zinn, M Byrd, ET Barr, R East
CCS 7, 352-365, 2007
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
T Zhu, D Phipps, A Pridgen, JR Crandall, DS Wallach
USENIX Security Symposium, 227-240, 2013
Analyzing the great firewall of china over space and time.
R Ensafi, P Winter, A Mueen, JR Crandall
Proc. Priv. Enhancing Technol. 2015 (1), 61-76, 2015
Temporal search: Detecting hidden malware timebombs with virtual machines
JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong
ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006
Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China
JC Park, JR Crandall
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
Minos: Architectural support for protecting control data
JR Crandall, SF Wu, FT Chong
ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 359-389, 2006
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
DAS De Oliveira, JR Crandall, G Wassermann, SF Wu, Z Su, FT Chong
Proceedings of the 1st workshop on Architectural and system support for …, 2006
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities
JR Crandall, SF Wu, FT Chong
Detection of Intrusions and Malware, and Vulnerability Assessment: Second …, 2005
Synchroscalar: A multiple clock domain, power-aware, tile-based embedded processor
J Oliver, R Rao, P Sultana, J Crandall, E Czernikowski, LW Jones IV, ...
ACM SIGARCH Computer Architecture News 32 (2), 150, 2004
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.
J Knockel, JR Crandall, J Saia
FOCI, 2011
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2015
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
Minos: Architectural support for software security through control data integrity
JR Crandall, F Chong
International Symposium on Microarchitecture 104, 2004
A security assessment of the minos architecture
JR Crandall, FT Chong
ACM SIGARCH Computer Architecture News 33 (1), 48-57, 2005
We chat, they watch: How international users unwittingly build up WeChat’s Chinese censorship apparatus
J Knockel, C Parsons, L Ruan, R Xiong, J Crandall, R Deibert
The ecology of malware
JR Crandall, R Ensafi, S Forrest, J Ladau, B Shebaro
Proceedings of the 2008 New Security Paradigms Workshop, 99-106, 2008
The system can't perform the operation now. Try again later.
Articles 1–20