What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jedidiah R. Crandall
Google Scholar
ORCID:
0000-0001-7864-2992
22
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/popets
Attacking Connection Tracking Frameworks as used by Virtual Private Networks.
Benjamin Mixon-Baca
Jeffrey Knockel
Diwen Xue
Tarun Ayyagari
Deepak Kapur
Roya Ensafi
Jedidiah R. Crandall
2022
conf/uss
OpenVPN is Open to VPN Fingerprinting.
Diwen Xue
Reethika Ramesh
Arham Jain
Michalis Kallitsis
J. Alex Halderman
Jedidiah R. Crandall
Roya Ensafi
2021
conf/uss
Blind In/On-Path Attacks and Applications to VPNs.
William J. Tolley
Beau Kujath
Mohammad Taha Khan
Narseo Vallina-Rodriguez
Jedidiah R. Crandall
2019
journals/popets
Detecting TCP/IP Connections via IPID Hash Collisions.
Geoffrey Alexander
Antonio M. Espinoza
Jedidiah R. Crandall
2018
conf/dsn
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Meisam Navaki Arefi
Geoffrey Alexander
Hooman Rokham
Aokun Chen
Michalis Faloutsos
Xuetao Wei
Daniela Seabra Oliveira
Jedidiah R. Crandall
2017
conf/uss
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application.
Antonio M. Espinoza
William J. Tolley
Jedidiah R. Crandall
Masashi Crete-Nishihata
Andrew Hilts
2016
conf/sec
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.
Daniela Oliveira
Jedidiah R. Crandall
Harry A. Kalodner
Nicole Morin
Megan Maher
Jesús Navarro
Felix Emiliano
2016
conf/nspw
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.
Aokun Chen
Pratik Prabhanjan Brahma
Dapeng Oliver Wu
Natalie C. Ebner
Brandon Matthews
Jedidiah R. Crandall
Xuetao Wei
Michalis Faloutsos
Daniela Oliveira
2015
journals/popets
Analyzing the Great Firewall of China Over Space and Time.
Roya Ensafi
Philipp Winter
Abdullah Mueen
Jedidiah R. Crandall
2014
conf/uss
Counting Packets Sent Between Arbitrary Internet Hosts.
Jeffrey Knockel
Jedidiah R. Crandall
2014
conf/uss
A Case Study in Helping Students to Covertly Eat Their Classmates.
Roya Ensafi
Mike Jacobi
Jedidiah R. Crandall
2013
conf/uss
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
Tao Zhu
David Phipps
Adam Pridgen
Jedidiah R. Crandall
Dan S. Wallach
2012
conf/uss
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
Roya Ensafi
Mike Jacobi
Jedidiah R. Crandall
2012
conf/uss
Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd.
Jeffrey Knockel
Jedidiah R. Crandall
2012
conf/uss
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.
Nicholas Aase
Jedidiah R. Crandall
Alvaro Diaz
Jeffrey Knockel
Jorge Ocana Molinero
Jared Saia
Dan S. Wallach
Tao Zhu
2012
conf/nspw
Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries.
Jedidiah R. Crandall
Daniela Oliveira
2011
conf/uss
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.
Jeffrey Knockel
Jedidiah R. Crandall
Jared Saia
2010
conf/uss
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Roya Ensafi
Jong Chun Park
Deepak Kapur
Jedidiah R. Crandall
2010
conf/nspw
On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?
Mohammed I. Al-Saleh
Jedidiah R. Crandall
2008
conf/nspw
The ecology of Malware.
Jedidiah R. Crandall
Roya Ensafi
Stephanie Forrest
Joshua Ladau
Bilal Shebaro
2007
conf/ccs
ConceptDoppler: a weather tracker for internet censorship.
Jedidiah R. Crandall
Daniel Zinn
Michael Byrd
Earl T. Barr
Rich East
2005
conf/ccs
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Jedidiah R. Crandall
Zhendong Su
Shyhtsun Felix Wu
Frederic T. Chong
Coauthors
Abdullah Mueen
(1)
Adam Pridgen
(1)
Alvaro Diaz
(1)
Andrew Hilts
(1)
Antonio M. Espinoza
(2)
Aokun Chen
(2)
Arham Jain
(1)
Beau Kujath
(1)
Benjamin Mixon-Baca
(1)
Bilal Shebaro
(1)
Brandon Matthews
(1)
Dan S. Wallach
(2)
Daniel Zinn
(1)
Daniela Oliveira
(3)
Daniela Seabra Oliveira
(1)
Dapeng Oliver Wu
(1)
David Phipps
(1)
Deepak Kapur
(2)
Diwen Xue
(2)
Earl T. Barr
(1)
Felix Emiliano
(1)
Frederic T. Chong
(1)
Geoffrey Alexander
(2)
Harry A. Kalodner
(1)
Hooman Rokham
(1)
J. Alex Halderman
(1)
Jared Saia
(2)
Jedidiah R. Crandall
(22)
Jeffrey Knockel
(5)
Jesús Navarro
(1)
Jong Chun Park
(1)
Jorge Ocana Molinero
(1)
Joshua Ladau
(1)
Masashi Crete-Nishihata
(1)
Megan Maher
(1)
Meisam Navaki Arefi
(1)
Michael Byrd
(1)
Michalis Faloutsos
(2)
Michalis Kallitsis
(1)
Mike Jacobi
(2)
Mohammad Taha Khan
(1)
Mohammed I. Al-Saleh
(1)
Narseo Vallina-Rodriguez
(1)
Natalie C. Ebner
(1)
Nicholas Aase
(1)
Nicole Morin
(1)
Philipp Winter
(1)
Pratik Prabhanjan Brahma
(1)
Reethika Ramesh
(1)
Rich East
(1)
Roya Ensafi
(7)
Shyhtsun Felix Wu
(1)
Stephanie Forrest
(1)
Tao Zhu
(2)
Tarun Ayyagari
(1)
William J. Tolley
(2)
Xuetao Wei
(2)
Zhendong Su
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to