Search Results - "Mickens, James"
-
1
Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains
Published in 2014 IEEE Symposium on Security and Privacy (01-05-2014)“…Pivot is a new JavaScript isolation framework for web applications. Pivot uses iframes as its low-level isolation containers, but it uses code rewriting to…”
Get full text
Conference Proceeding -
2
Create an IPCC-like body to harness benefits and combat harms of digital tech
Published in Nature (London) (18-05-2023)“…Emerging information technologies, including ChatGPT, require proper stewardship. An intergovernmental panel to synthesize the evidence offers the best path…”
Get full text
Journal Article -
3
Holepunch: Fast, Secure File Deletion with Crash Consistency
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19-05-2024)“…A file system provides secure deletion if, after a file is deleted, an attacker with physical possession of the storage device cannot recover any data from the…”
Get full text
Conference Proceeding -
4
Memoir: Practical State Continuity for Protected Modules
Published in 2011 IEEE Symposium on Security and Privacy (01-05-2011)“…To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This…”
Get full text
Conference Proceeding -
5
TinyML Security: Exploring Vulnerabilities in Resource-Constrained Machine Learning Systems
Published 11-11-2024“…Tiny Machine Learning (TinyML) systems, which enable machine learning inference on highly resource-constrained devices, are transforming edge computing but…”
Get full text
Journal Article -
6
Identifying Valuable Pointers in Heap Data
Published in 2021 IEEE Security and Privacy Workshops (SPW) (01-05-2021)“…Historically, attackers have sought to manipulate programs through the corruption of return addresses, function pointers, and other control flow data. However,…”
Get full text
Conference Proceeding -
7
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Published 10-05-2020“…Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly detectors is hard. There…”
Get full text
Journal Article -
8
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Published 14-01-2020“…Advanced Persistent Threats (APTs) are difficult to detect due to their "low-and-slow" attack patterns and frequent use of zero-day exploits. We present…”
Get full text
Journal Article -
9
SIGL: Securing Software Installations Through Deep Graph Learning
Published 26-08-2020“…Many users implicitly assume that software can only be exploited after it is installed. However, recent supply-chain attacks demonstrate that application…”
Get full text
Journal Article -
10
McFly: Time-Travel Debugging for the Web
Published 28-10-2018“…Time-traveling debuggers offer the promise of simplifying debugging by letting developers freely step forwards and backwards through a program's execution…”
Get full text
Journal Article -
11
Collaborative Measurements of Upload Speeds in P2P Systems
Published in 2010 Proceedings IEEE INFOCOM (01-03-2010)“…In this paper, we study the theory of collaborative upload bandwidth measurement in peer-to-peer environments. A host can use a bandwidth estimation probe to…”
Get full text
Conference Proceeding -
12
Concilium: Collaborative Diagnosis of Broken Overlay Routes
Published in 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07) (01-06-2007)“…In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible…”
Get full text
Conference Proceeding -
13
Exploiting host availability in distributed systems
Published 01-01-2008“…As distributed systems become more decentralized, fluctuating host availability is an increasingly disruptive phenomenon. Older systems such as AFS used a…”
Get full text
Dissertation -
14
Exploiting host availability in distributed systems
Get full text
Dissertation -
15
Analytical Models for Epidemics in Mobile Networks
Published in Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007) (01-10-2007)“…Mobile computer networks are formed by portable electronic devices like cellphones or laptops that can establish transient, point-to-point communication links…”
Get full text
Conference Proceeding