Follow
James Newsome
James Newsome
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
J Newsome, DX Song
NDSS 5, 3-4, 2005
24162005
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Proceedings of the 3rd international symposium on Information processing in …, 2004
21642004
Polygraph: Automatically generating signatures for polymorphic worms
J Newsome, B Karp, D Song
2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005
12572005
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10762008
GEM: Graph embedding for routing and data-centric storage in sensor networks without geographic information
J Newsome, D Song
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
4372003
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
4132006
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection: Countering the Largest Security Threat, 65-88, 2008
3352008
Paragraph: Thwarting signature learning by training maliciously
J Newsome, B Karp, D Song
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
3062006
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
1882012
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1772013
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
D Brumley, J Caballero, Z Liang, J Newsome, D Song
USENIX Security Symposium 15, 2007
1632007
Replayer: Automatic protocol replay by binary analysis
J Newsome, D Brumley, J Franklin, D Song
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1582006
{MiniBox}: A {Two-Way} Sandbox for x86 Native Code
Y Li, J McCune, J Newsome, A Perrig, B Baker, W Drewry
2014 USENIX annual technical conference (USENIX ATC 14), 409-420, 2014
1432014
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
J Newsome, D Brumley, D Song, J Chamcham, X Kovah
NDSS, 2006
1412006
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
1182007
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
1082012
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms
E Owusu, J Guajardo, J McCune, J Newsome, A Perrig, A Vasudevan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1042013
Measuring channel capacity to distinguish undue influence
J Newsome, S McCamant, D Song
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
1042009
Sweeper: A lightweight end-to-end system for defending against fast worms
J Tucek, J Newsome, S Lu, C Huang, S Xanthos, D Brumley, Y Zhou, ...
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer …, 2007
922007
Systems and methods for maintaining integrity and secrecy in untrusted computing platforms
JG Merchan, EK Owusu, JMC McCune, JD Newsome, A Vasudevan, ...
US Patent 9,367,701, 2016
822016
The system can't perform the operation now. Try again later.
Articles 1–20