Seattle: a platform for educational cloud computing J Cappos, I Beschastnikh, A Krishnamurthy, T Anderson Proceedings of the 40th ACM technical symposium on Computer science …, 2009 | 236 | 2009 |
{CHAINIAC}: Proactive {Software-Update} transparency via collectively signed skipchains and verified builds K Nikitin, E Kokoris-Kogias, P Jovanovic, N Gailly, L Gasser, I Khoffi, ... 26th USENIX Security Symposium (USENIX Security 17), 1271-1287, 2017 | 175 | 2017 |
Survivable key compromise in software update systems J Samuel, N Mathewson, J Cappos, R Dingledine Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 142 | 2010 |
A look in the mirror: Attacks on package managers J Cappos, J Samuel, S Baker, JH Hartman Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 124 | 2008 |
" On the internet, nobody knows you're a dog" a twitter case study of anonymity in social networks ST Peddinti, KW Ross, J Cappos Proceedings of the second ACM conference on Online social networks, 83-94, 2014 | 111 | 2014 |
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots D Oliveira, M Rosenthal, N Morin, KC Yeh, J Cappos, Y Zhuang Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 107 | 2014 |
{API} blindspots: Why experienced developers write vulnerable code DS Oliveira, T Lin, MS Rahman, R Akefirad, D Ellis, E Perez, R Bobhate, ... Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 315-328, 2018 | 83 | 2018 |
Uptane: Securing software updates for automobiles T Karthik, A Brown, S Awwad, D McCoy, R Bielawski, C Mott, S Lauzon, ... International Conference on Embedded Security in Car, 1-11, 2016 | 83 | 2016 |
Understanding password database compromises D Mirante, J Cappos Dept. of Computer Science and Engineering Polytechnic Inst. of NYU, Tech …, 2013 | 77 | 2013 |
Understanding misunderstandings in source code D Gopstein, J Iannacone, Y Yan, L DeLong, Y Zhuang, MKC Yeh, ... Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 68 | 2017 |
Retaining sandbox containment despite bugs in privileged memory-safe code J Cappos, A Dadgar, J Rasley, J Samuel, I Beschastnikh, C Barsan, ... Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 64 | 2010 |
Diplomat: Using delegations to protect community repositories TK Kuppusamy, S Torres-Arias, V Diaz, J Cappos 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016 | 57 | 2016 |
Selectively taming background android apps to improve battery lifetime M Martins, J Cappos, R Fonseca 2015 USENIX Annual Technical Conference (USENIX ATC 15), 563-575, 2015 | 55 | 2015 |
A first look at vehicle data collection via smartphone sensors M Reininger, S Miller, Y Zhuang, J Cappos 2015 IEEE Sensors Applications Symposium (SAS), 1-6, 2015 | 52 | 2015 |
User anonymity on twitter ST Peddinti, KW Ross, J Cappos IEEE Security & Privacy 15 (3), 84-87, 2017 | 47 | 2017 |
Measuring the fitness of fitness trackers CG Bender, JC Hoffstot, BT Combs, S Hooshangi, J Cappos 2017 IEEE Sensors Applications Symposium (SAS), 1-6, 2017 | 45 | 2017 |
{Lock-in-Pop}: Securing Privileged Operating System Kernels by Keeping on the Beaten Path Y Li, B Dolan-Gavitt, S Weber, J Cappos 2017 USENIX Annual Technical Conference (USENIX ATC 17), 1-13, 2017 | 45 | 2017 |
Uptane: Security and customizability of software updates for vehicles TK Kuppusamy, LA DeLong, J Cappos IEEE vehicular technology magazine 13 (1), 66-73, 2018 | 42 | 2018 |
{NetCheck}: Network Diagnoses from Blackbox Traces Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ... 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014 | 41 | 2014 |
Package management security J Cappos, J Samuel, S Baker, JH Hartman University of Arizona Technical Report, 08-02, 2008 | 40 | 2008 |