Seattle: a platform for educational cloud computing J Cappos, I Beschastnikh, A Krishnamurthy, T Anderson Proceedings of the 40th ACM technical symposium on Computer science …, 2009 | 210 | 2009 |
Service combinators for web computing L Cardelli, R Davies IEEE Transactions on Software Engineering 25 (3), 309-316, 1999 | 163 | 1999 |
{CHAINIAC}: Proactive software-update transparency via collectively signed skipchains and verified builds K Nikitin, E Kokoris-Kogias, P Jovanovic, N Gailly, L Gasser, I Khoffi, ... 26th {USENIX} Security Symposium ({USENIX} Security 17), 1271-1287, 2017 | 98 | 2017 |
Survivable key compromise in software update systems J Samuel, N Mathewson, J Cappos, R Dingledine Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 86 | 2010 |
A look in the mirror: Attacks on package managers J Cappos, J Samuel, S Baker, JH Hartman Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 79 | 2008 |
Understanding password database compromises D Mirante, J Cappos Dept. of Computer Science and Engineering Polytechnic Inst. of NYU, Tech …, 2013 | 72 | 2013 |
" On the internet, nobody knows you're a dog" a twitter case study of anonymity in social networks ST Peddinti, KW Ross, J Cappos Proceedings of the second ACM conference on Online social networks, 83-94, 2014 | 69 | 2014 |
Retaining sandbox containment despite bugs in privileged memory-safe code J Cappos, A Dadgar, J Rasley, J Samuel, I Beschastnikh, C Barsan, ... Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 60 | 2010 |
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots D Oliveira, M Rosenthal, N Morin, KC Yeh, J Cappos, Y Zhuang Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 49 | 2014 |
Selectively taming background android apps to improve battery lifetime M Martins, J Cappos, R Fonseca 2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 563-575, 2015 | 44 | 2015 |
A first look at vehicle data collection via smartphone sensors M Reininger, S Miller, Y Zhuang, J Cappos 2015 IEEE Sensors Applications Symposium (SAS), 1-6, 2015 | 39 | 2015 |
Netcheck: Network diagnoses from blackbox traces Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ... 11th {USENIX} Symposium on Networked Systems Design and Implementation …, 2014 | 36 | 2014 |
Stork: Package Management for Distributed VM Environments. J Cappos, SM Baker, J Plichta, D Nguyen, J Hardies, M Borgard, ... LISA 7, 1-16, 2007 | 35 | 2007 |
Proper: Privileged operations in a virtualised system environment S Muir, L Peterson, M Fiuczynski, J Cappos, J Hartman Proc. USENIX’05, 367-370, 2005 | 35* | 2005 |
Rhizoma: a runtime for self-deploying, self-managing overlays Q Yin, A Schüpbach, J Cappos, A Baumann, T Roscoe ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2009 | 31 | 2009 |
{API} Blindspots: Why Experienced Developers Write Vulnerable Code DS Oliveira, T Lin, MS Rahman, R Akefirad, D Ellis, E Perez, R Bobhate, ... Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 315-328, 2018 | 29 | 2018 |
Blursense: Dynamic fine-grained access control for smartphone privacy J Cappos, L Wang, R Weiss, Y Yang, Y Zhuang 2014 IEEE Sensors Applications Symposium (SAS), 329-332, 2014 | 28 | 2014 |
Package management security J Cappos, J Samuel, S Baker, JH Hartman University of Arizona Technical Report, 08-02, 2008 | 28 | 2008 |
San fermın: aggregating large data sets using a binomial swap forest J Cappos, JH Hartman USENIX Symposium on Networked System Design and Implementation (NSDI 2008 …, 2008 | 28 | 2008 |
Uptane: Securing software updates for automobiles T Karthik, A Brown, S Awwad, D McCoy, R Bielawski, C Mott, S Lauzon, ... International Conference on Embedded Security in Car, 1-11, 2016 | 27 | 2016 |