Justin Cappos
Justin Cappos
Associate Professor of Computer Science and Engineering, NYU
Verified email at nyu.edu - Homepage
TitleCited byYear
Seattle: a platform for educational cloud computing
J Cappos, I Beschastnikh, A Krishnamurthy, T Anderson
Acm sigcse bulletin 41 (1), 111-115, 2009
1852009
Survivable key compromise in software update systems
J Samuel, N Mathewson, J Cappos, R Dingledine
Proceedings of the 17th ACM conference on Computer and communications …, 2010
602010
Retaining sandbox containment despite bugs in privileged memory-safe code
J Cappos, A Dadgar, J Rasley, J Samuel, I Beschastnikh, C Barsan, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
542010
A look in the mirror: Attacks on package managers
J Cappos, J Samuel, S Baker, JH Hartman
Proceedings of the 15th ACM conference on Computer and communications …, 2008
532008
Understanding password database compromises
D Mirante, J Cappos
Dept. of Computer Science and Engineering Polytechnic Inst. of NYU, Tech …, 2013
472013
On the internet, nobody knows you're a dog: A Twitter case study of anonymity in social networks
ST Peddinti, KW Ross, J Cappos
Proceedings of the second ACM conference on Online social networks, 83-94, 2014
462014
{CHAINIAC}: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
K Nikitin, E Kokoris-Kogias, P Jovanovic, N Gailly, L Gasser, I Khoffi, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1271-1287, 2017
412017
Proper: Privileged operations in a virtualised system environment
S Muir, L Peterson, M Fiuczynski, J Cappos, J Hartman
Proc. USENIX’05, 367-370, 2005
34*2005
Stork: Package Management for Distributed VM Environments.
J Cappos, SM Baker, J Plichta, D Nguyen, J Hardies, M Borgard, ...
LISA 7, 1-16, 2007
332007
Selectively taming background android apps to improve battery lifetime
M Martins, J Cappos, R Fonseca
2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 563-575, 2015
322015
Netcheck: Network diagnoses from blackbox traces
Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ...
11th {USENIX} Symposium on Networked Systems Design and Implementation …, 2014
282014
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots
D Oliveira, M Rosenthal, N Morin, KC Yeh, J Cappos, Y Zhuang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
262014
San fermın: aggregating large data sets using a binomial swap forest
J Cappos, JH Hartman
USENIX Symposium on Networked System Design and Implementation (NSDI 2008 …, 2008
262008
Rhizoma: a runtime for self-deploying, self-managing overlays
Q Yin, A Schüpbach, J Cappos, A Baumann, T Roscoe
Proceedings of the 10th ACM/IFIP/USENIX International Conference on …, 2009
252009
A first look at vehicle data collection via smartphone sensors
M Reininger, S Miller, Y Zhuang, J Cappos
2015 IEEE Sensors Applications Symposium (SAS), 1-6, 2015
242015
Blursense: Dynamic fine-grained access control for smartphone privacy
J Cappos, L Wang, R Weiss, Y Yang, Y Zhuang
2014 IEEE Sensors Applications Symposium (SAS), 329-332, 2014
242014
Tomato a virtual research environment for large scale distributed systems research
P Müller, D Schwerdel, J Cappos
PIK-Praxis der Informationsverarbeitung und Kommunikation 37 (1), 23-32, 2014
182014
Diplomat: Using delegations to protect community repositories
TK Kuppusamy, S Torres-Arias, V Diaz, J Cappos
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
172016
PolyPasswordHasher: protecting passwords in the event of a password file disclosure
J Cappos, S Torres
Tech. Rep., 2014 [Online]. Available: https://password-hashing. net …, 2014
17*2014
Dependable Self-Hosting Distributed Systems Using Constraints.
Q Yin, J Cappos, A Baumann, T Roscoe
HotDep, 2008
172008
The system can't perform the operation now. Try again later.
Articles 1–20