default search action
Jedidiah R. Crandall
Person information
- affiliation: University of New Mexico, USA
- affiliation: University of California, Davis, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Tarun Ayyagari, Deepak Kapur, Roya Ensafi, Jedidiah R. Crandall:
Attacking Connection Tracking Frameworks as used by Virtual Private Networks. Proc. Priv. Enhancing Technol. 2024(3): 109-126 (2024) - [i13]Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. CoRR abs/2403.03998 (2024) - [i12]Joshua J. Daymude, Antonio M. Espinoza, Sean Bergen, Benjamin Mixon-Baca, Jeffrey Knockel, Jedidiah R. Crandall:
A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness, Security, and Performance. CoRR abs/2406.06483 (2024) - 2023
- [j12]Christopher Brant, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira:
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking. ACM Comput. Surv. 55(2): 17:1-17:33 (2023) - 2022
- [c44]Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi:
TSPU: Russia's decentralized censorship system. IMC 2022: 179-194 - [c43]Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. USENIX Security Symposium 2022: 483-500 - 2021
- [c42]Deeksha Dangwal, Zhizhou Zhang, Jedidiah R. Crandall, Timothy Sherwood:
Context-Aware Privacy-Optimizing Address Tracing. SEED 2021: 150-162 - [c41]William J. Tolley, Beau Kujath, Mohammad Taha Khan, Narseo Vallina-Rodriguez, Jedidiah R. Crandall:
Blind In/On-Path Attacks and Applications to VPNs. USENIX Security Symposium 2021: 3129-3146 - 2020
- [c40]Nikolaos Sapountzis, Ruimin Sun, Xuetao Wei, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira:
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems. ICDCS 2020: 1090-1100 - [i11]Scott Levy, Jedidiah R. Crandall:
The Program with a Personality: Analysis of Elk Cloner, the First Personal Computer Virus. CoRR abs/2007.15759 (2020)
2010 – 2019
- 2019
- [j11]Geoffrey Alexander, Antonio M. Espinoza, Jedidiah R. Crandall:
Detecting TCP/IP Connections via IPID Hash Collisions. Proc. Priv. Enhancing Technol. 2019(4): 311-328 (2019) - [c39]Kirtus G. Leyba, Benjamin Edwards, Cynthia Freeman, Jedidiah R. Crandall, Stephanie Forrest:
Borders and gateways: measuring and analyzing national as chokepoints. COMPASS 2019: 184-194 - [i10]Meisam Navaki Arefi, Rajkumar Pandi, Michael Carl Tschantz, Jedidiah R. Crandall, King-wa Fu, Dahlia Qiu Shi, Miao Sha:
Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics. CoRR abs/1906.10861 (2019) - 2018
- [c38]Meisam Navaki Arefi, Geoffrey Alexander, Hooman Rokham, Aokun Chen, Michalis Faloutsos, Xuetao Wei, Daniela Seabra Oliveira, Jedidiah R. Crandall:
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking. DSN 2018: 231-242 - [c37]Meisam Navaki Arefi, Geoffrey Alexander, Jedidiah R. Crandall:
PIITracker: Automatic Tracking of Personally Identifiable Information in Windows. EuroSec@EuroSys 2018: 3:1-3:6 - [c36]Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall:
ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path. INFOCOM 2018: 2069-2077 - [i9]Jeffrey Knockel, Thomas Ristenpart, Jedidiah R. Crandall:
When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users. CoRR abs/1802.03367 (2018) - [i8]Daniel Riofrio, Anacaren Ruiz, Erin Sosebee, Qasim Raza, Adnan Bashir, Jed Crandall:
Tracking Elections: our experience during the presidential elections in Ecuador. CoRR abs/1807.06147 (2018) - 2017
- [c35]Mahdi Zamani, Jared Saia, Jedidiah R. Crandall:
TorBricks: Blocking-Resistant Tor Bridge Distribution. SSS 2017: 426-440 - [c34]Antonio M. Espinoza, William J. Tolley, Jedidiah R. Crandall, Masashi Crete-Nishihata, Andrew Hilts:
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application. FOCI @ USENIX Security Symposium 2017 - 2016
- [c33]Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro, Jedidiah R. Crandall:
V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering. ARES 2016: 266-271 - [c32]Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall:
High Fidelity Off-Path Round-Trip Time Measurement via TCP/IP Side Channels with Duplicate SYNs. GLOBECOM 2016: 1-6 - [c31]Aokun Chen, Pratik Prabhanjan Brahma, Dapeng Oliver Wu, Natalie C. Ebner, Brandon Matthews, Jedidiah R. Crandall, Xuetao Wei, Michalis Faloutsos, Daniela Oliveira:
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security. NSPW 2016: 23-35 - [c30]Daniela Oliveira, Jedidiah R. Crandall, Harry A. Kalodner, Nicole Morin, Megan Maher, Jesús Navarro, Felix Emiliano:
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities. SEC 2016: 227-242 - [i7]Mahdi Zamani, Jared Saia, Jedidiah R. Crandall:
TorBricks: Blocking-Resistant Tor Bridge Distribution. CoRR abs/1608.00509 (2016) - 2015
- [j10]Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Analyzing the Great Firewall of China Over Space and Time. Proc. Priv. Enhancing Technol. 2015(1): 61-76 (2015) - [c29]Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall:
Original SYN: Finding machines hidden behind firewalls. INFOCOM 2015: 720-728 - [c28]Geoffrey Alexander, Jedidiah R. Crandall:
Off-path round trip time measurement via TCP/IP side channels. INFOCOM 2015: 1589-1597 - [c27]Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel:
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering. NS Ethics@SIGCOMM 2015: 3 - 2014
- [c26]Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels. PAM 2014: 109-118 - [c25]Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall:
A Case Study in Helping Students to Covertly Eat Their Classmates. 3GSE 2014 - [c24]Jeffrey Knockel, Jedidiah R. Crandall:
Counting Packets Sent Between Arbitrary Internet Hosts. FOCI 2014 - [p1]Daniela Oliveira, Jedidiah R. Crandall:
Technical Foundations of Information Systems Security. Computing Handbook, 3rd ed. (2) 2014: 52: 1-17 - [e2]Jedidiah R. Crandall, Vern Paxson:
4th USENIX Workshop on Free and Open Communications on the Internet, FOCI '14, San Diego, CA, USA, August 18, 2014. USENIX Association 2014 [contents] - [i6]Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall. CoRR abs/1410.0735 (2014) - 2013
- [j9]Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, Greg Wiseman:
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18(7) (2013) - [j8]Mohammed I. Al-Saleh, Antonio M. Espinoza, Jedidiah R. Crandall:
Antivirus performance characterisation: system-wide view. IET Inf. Secur. 7(2) (2013) - [j7]Bilal Shebaro, Fernando Pérez-González, Jedidiah R. Crandall:
Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels. Int. J. Digit. Crime Forensics 5(1): 54-69 (2013) - [c23]Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. USENIX Security Symposium 2013: 227-240 - [e1]Jedidiah R. Crandall, Joss Wright:
3rd USENIX Workshop on Free and Open Communications on the Internet, FOCI '13, Washington, D.C., USA, August 13, 2013. USENIX Association 2013 [contents] - [i5]Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. CoRR abs/1303.0597 (2013) - [i4]Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version. CoRR abs/1312.5739 (2013) - 2012
- [j6]Philipp Winter, Jedidiah R. Crandall:
The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint. login Usenix Mag. 37(6) (2012) - [c22]Jedidiah R. Crandall, Daniela Oliveira:
Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries. NSPW 2012: 141-152 - [c21]Peiyou Song, Anhei Shu, David Phipps, Mohit Tiwari, Dan S. Wallach, Jedidiah R. Crandall, George F. Luger:
Language without words: A pointillist model for natural language processing. SCIS&ISIS 2012: 11-15 - [c20]Nicholas Aase, Jedidiah R. Crandall, Alvaro Diaz, Jeffrey Knockel, Jorge Ocana Molinero, Jared Saia, Dan S. Wallach, Tao Zhu:
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations. FOCI 2012 - [c19]Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall:
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper. CSET 2012 - [c18]Jeffrey Knockel, Jedidiah R. Crandall:
Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd. FOCI 2012 - [i3]Peiyou Song, Anhei Shu, Anyu Zhou, Dan S. Wallach, Jedidiah R. Crandall:
A Pointillism Approach for Natural Language Processing of Social Media. CoRR abs/1206.4958 (2012) - [i2]Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
Tracking and Quantifying Censorship on a Chinese Microblogging Site. CoRR abs/1211.6166 (2012) - [i1]Peiyou Song, Anhei Shu, David Phipps, Dan S. Wallach, Mohit Tiwari, Jedidiah R. Crandall, George F. Luger:
Language Without Words: A Pointillist Model for Natural Language Processing. CoRR abs/1212.3228 (2012) - 2011
- [j5]Bilal Shebaro, Jedidiah R. Crandall:
Privacy-preserving network flow recording. Digit. Investig. 8(Supplement): S90-S100 (2011) - [c17]Mohammed I. Al-Saleh, Jedidiah R. Crandall:
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software. LEET 2011 - [c16]Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia:
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance. FOCI 2011 - 2010
- [j4]Bilal Shebaro, Fernando Pérez-González, Jedidiah R. Crandall:
Leaving timing-channel fingerprints in hidden service log files. Digit. Investig. 7(Supplement): S104-S113 (2010) - [c15]Jong Chun Park, Jedidiah R. Crandall:
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China. ICDCS 2010: 315-326 - [c14]Mohammed I. Al-Saleh, Jedidiah R. Crandall:
On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible? NSPW 2010: 17-32 - [c13]Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall:
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. USENIX Security Symposium 2010: 257-272
2000 – 2009
- 2009
- [j3]Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong:
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Trans. Comput. Sci. 4: 244-262 (2009) - [c12]Mohammed I. Al-Saleh, Patrick G. Bridges, Jedidiah R. Crandall:
Architectural Support for Securing Sensor Networks Against Remote Attacks. SNA 2009: 120-127 - 2008
- [c11]Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang:
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. ISC 2008: 114-130 - [c10]Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong:
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. NOMS 2008: 121-128 - [c9]Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro:
The ecology of Malware. NSPW 2008: 99-106 - 2007
- [c8]Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl T. Barr, Rich East:
ConceptDoppler: a weather tracker for internet censorship. CCS 2007: 352-365 - 2006
- [j2]Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong:
Minos: Architectural support for protecting control data. ACM Trans. Archit. Code Optim. 3(4): 359-389 (2006) - [c7]Jedidiah R. Crandall, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong:
Temporal search: detecting hidden malware timebombs with virtual machines. ASPLOS 2006: 25-36 - [c6]Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong:
ExecRecorder: VM-based full-system replay for attack analysis and system recovery. ASID 2006: 66-71 - 2005
- [j1]Jedidiah R. Crandall, Frederic T. Chong:
A security assessment of the minos architecture. SIGARCH Comput. Archit. News 33(1): 48-57 (2005) - [c5]Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong:
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. CCS 2005: 235-248 - [c4]Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong:
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. DIMVA 2005: 32-50 - 2004
- [c3]John Y. Oliver, Ravishankar Rao, Paul Sultana, Jedidiah R. Crandall, Erik Czernikowski, Leslie W. Jones IV, Diana Franklin, Venkatesh Akella, Frederic T. Chong:
Synchroscalar: A Multiple Clock Domain, Power-Aware, Tile-Based Embedded Processor. ISCA 2004: 150-161 - [c2]Jedidiah R. Crandall, Frederic T. Chong:
Minos: Control Data Attack Prevention Orthogonal to Memory Model. MICRO 2004: 221-232 - 2003
- [c1]John Y. Oliver, Ravishankar Rao, Paul Sultana, Jedidiah R. Crandall, Erik Czernikowski, Leslie W. Jones IV, Dean Copsey, Diana Keen, Venkatesh Akella, Frederic T. Chong:
Synchroscalar: Initial Lessons in Power-Aware Design of a Tile-Based Embedded Architecture. PACS 2003: 73-85
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint