Подписаться
Ira Ray Jenkins
Ira Ray Jenkins
Подтвержден адрес электронной почты в домене cs.dartmouth.edu - Главная страница
Название
Процитировано
Процитировано
Год
Ghostbusting: Mitigating Spectre with intraprocess memory isolation
IR Jenkins, P Anantharaman, R Shapiro, JP Brady, S Bratus, SW Smith
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-11, 2020
152020
Distributed IoT attestation via blockchain
IR Jenkins, SW Smith
2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet …, 2020
102020
Speaking the local dialect: exploiting differences between IEEE 802.15. 4 receivers with commodity radios for fingerprinting, targeted attacks, and WIDS evasion
IR Jenkins, R Shapiro, S Bratus, T Goodspeed, R Speers, D Dowd
102014
Fingerprinting IEEE 802.15. 4 devices with commodity radios
R Speers, T Goodspeed, IR Jenkins, R Shapiro, S Bratus
Technical report, Dartmouth Computer Science, 2014. http://www. cs …, 2014
9*2014
Mismorphism: The heart of the weird machine
P Anantharaman, V Kothari, JP Brady, IR Jenkins, S Ali, MC Millian, ...
Security Protocols XXVII: 27th International Workshop, Cambridge, UK, April …, 2020
72020
Reinventing the privilege drop: How principled preservation of programmer intent would prevent security bugs
IR Jenkins, S Bratus, S Smith, M Koo
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
62018
Intent as a secure design primitive
P Anantharaman, JP Brady, IR Jenkins, VH Kothari, MC Millian, K Palani, ...
Modeling and Design of Secure Internet of Things, 529-562, 2020
32020
Defense in Depth of Resource-Constrained Devices
IR Jenkins
Dartmouth College, 2020
32020
Distributed IoT attestation via blockchain (extended version)
IR Jenkins, SW Smith
32020
Short paper: speaking the local dialect: exploiting differences between ieee 802.15. 4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion
IR Jenkins, R Shapiro, S Bratus, T Goodspeed, R Speers, D Dowd
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
32014
Human-computability boundaries
V Kothari, P Anantharaman, IR Jenkins, MC Millian, JP Brady, S Ali, ...
Security Protocols XXVII: 27th International Workshop, Cambridge, UK, April …, 2020
22020
Mismorphism: The Heart of the Weird Machine
J Blythe, V Kothari, JP Brady, IR Jenkins, S Ali, M Millian, R Koppel, ...
2019
Android Benchmarking for Architectural Research
IR Jenkins
Florida State University, 2012
2012
Reinventing the Privilege Drop
IR Jenkins, S Bratus, S Smith, M Koo
Flocking behavior of US equities
IR Jenkins, T Pierson
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–15