Search Results - "Mickens, James"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains by Mickens, James

    “…Pivot is a new JavaScript isolation framework for web applications. Pivot uses iframes as its low-level isolation containers, but it uses code rewriting to…”
    Get full text
    Conference Proceeding
  2. 2

    Create an IPCC-like body to harness benefits and combat harms of digital tech by Bak-Coleman, Joseph, Bergstrom, Carl T., Jacquet, Jennifer, Mickens, James, Tufekci, Zeynep, Roberts, Timmons

    Published in Nature (London) (18-05-2023)
    “…Emerging information technologies, including ChatGPT, require proper stewardship. An intergovernmental panel to synthesize the evidence offers the best path…”
    Get full text
    Journal Article
  3. 3

    Holepunch: Fast, Secure File Deletion with Crash Consistency by Ratliff, Zachary, Goh, Wittmann, Wieland, Abe, Mickens, James, Williams, Ryan

    “…A file system provides secure deletion if, after a file is deleted, an attacker with physical possession of the storage device cannot recover any data from the…”
    Get full text
    Conference Proceeding
  4. 4

    Memoir: Practical State Continuity for Protected Modules by Parno, B., Lorch, J. R., Douceur, J. R., Mickens, J., McCune, J. M.

    “…To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This…”
    Get full text
    Conference Proceeding
  5. 5

    TinyML Security: Exploring Vulnerabilities in Resource-Constrained Machine Learning Systems by Huckelberry, Jacob, Zhang, Yuke, Sansone, Allison, Mickens, James, Beerel, Peter A, Reddi, Vijay Janapa

    Published 11-11-2024
    “…Tiny Machine Learning (TinyML) systems, which enable machine learning inference on highly resource-constrained devices, are transforming edge computing but…”
    Get full text
    Journal Article
  6. 6

    Identifying Valuable Pointers in Heap Data by Roney, James, Appel, Troy, Pinisetti, Prateek, Mickens, James

    “…Historically, attackers have sought to manipulate programs through the corruption of return addresses, function pointers, and other control flow data. However,…”
    Get full text
    Conference Proceeding
  7. 7

    Xanthus: Push-button Orchestration of Host Provenance Data Collection by Han, Xueyuan, Mickens, James, Gehani, Ashish, Seltzer, Margo, Pasquier, Thomas

    Published 10-05-2020
    “…Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly detectors is hard. There…”
    Get full text
    Journal Article
  8. 8

    UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats by Han, Xueyuan, Pasquier, Thomas, Bates, Adam, Mickens, James, Seltzer, Margo

    Published 14-01-2020
    “…Advanced Persistent Threats (APTs) are difficult to detect due to their "low-and-slow" attack patterns and frequent use of zero-day exploits. We present…”
    Get full text
    Journal Article
  9. 9

    SIGL: Securing Software Installations Through Deep Graph Learning by Han, Xueyuan, Yu, Xiao, Pasquier, Thomas, Li, Ding, Rhee, Junghwan, Mickens, James, Seltzer, Margo, Chen, Haifeng

    Published 26-08-2020
    “…Many users implicitly assume that software can only be exploited after it is installed. However, recent supply-chain attacks demonstrate that application…”
    Get full text
    Journal Article
  10. 10

    McFly: Time-Travel Debugging for the Web by Vilk, John, Berger, Emery D, Mickens, James, Marron, Mark

    Published 28-10-2018
    “…Time-traveling debuggers offer the promise of simplifying debugging by letting developers freely step forwards and backwards through a program's execution…”
    Get full text
    Journal Article
  11. 11

    Collaborative Measurements of Upload Speeds in P2P Systems by Douceur, J R, Mickens, J, Moscibroda, T, Panigrahi, D

    Published in 2010 Proceedings IEEE INFOCOM (01-03-2010)
    “…In this paper, we study the theory of collaborative upload bandwidth measurement in peer-to-peer environments. A host can use a bandwidth estimation probe to…”
    Get full text
    Conference Proceeding
  12. 12

    Concilium: Collaborative Diagnosis of Broken Overlay Routes by Mickens, J.W., Noble, B.D.

    “…In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible…”
    Get full text
    Conference Proceeding
  13. 13

    Exploiting host availability in distributed systems by Mickens, James W

    Published 01-01-2008
    “…As distributed systems become more decentralized, fluctuating host availability is an increasingly disruptive phenomenon. Older systems such as AFS used a…”
    Get full text
    Dissertation
  14. 14

    Exploiting host availability in distributed systems by Mickens, James W

    “…As distributed systems become more decentralized, fluctuating host availability is an increasingly disruptive phenomenon. Older systems such as AFS used a…”
    Get full text
    Dissertation
  15. 15

    Analytical Models for Epidemics in Mobile Networks by Mickens, James W., Noble, Brian D.

    “…Mobile computer networks are formed by portable electronic devices like cellphones or laptops that can establish transient, point-to-point communication links…”
    Get full text
    Conference Proceeding