Jason Franklin
Jason Franklin
Research Associate, Stanford University
Verified email at cs.stanford.edu - Homepage
Title
Cited by
Cited by
Year
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
6772009
An inquiry into the nature and causes of the wealth of internet miscreants.
J Franklin, A Perrig, V Paxson, S Savage
ACM conference on Computer and communications security 10, 1315245.1315292, 2007
5112007
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
J Franklin, D McCoy, P Tabriz, V Neagoe, JV Randwyk, D Sicker
USENIX Security Symposium 3, 16-89, 2006
2962006
Compatibility Is Not Transparency: VMM Detection Myths and Realities.
T Garfinkel, K Adams, A Warfield, J Franklin
HotOS, 2007
2562007
Mapping Internet Sensors with Probe Response Attacks.
J Bethencourt, J Franklin, MK Vernon
USENIX security symposium, 193-208, 2005
1762005
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
2009 30th IEEE Symposium on Security and Privacy, 221-236, 2009
1332009
Replayer: Automatic protocol replay by binary analysis
J Newsome, D Brumley, J Franklin, D Song
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1322006
The data on diversity
B Nelson
Communications of the ACM 57 (11), 86-95, 2014
93*2014
Energy-efficient cluster computing with FAWN: Workloads and implications
V Vasudevan, D Andersen, M Kaminsky, L Tan, J Franklin, I Moraru
Proceedings of the 1st International Conference on Energy-Efficient …, 2010
682010
Remote detection of virtual machine monitors with fuzzy benchmarking
J Franklin, M Luk, JM McCune, A Seshadri, A Perrig, L Van Doorn
ACM SIGOPS Operating Systems Review 42 (3), 83-92, 2008
572008
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Communications of the ACM 54 (7), 101-109, 2011
492011
FAWNdamentally power-efficient clusters
V Vasudevan, J Franklin, D Andersen, A Phanishayee, L Tan, ...
Carnegie Mellon University, 2009
402009
Attacking, repairing, and verifying SecVisor: A retrospective on the security of a hypervisor
J Franklin, A Seshadri, N Qu, S Chaki, A Datta
Tech. Rep. CMU-CyLab-08-008, Carnegie Mellon University, 2008
372008
Compositional system security with interface-confined adversaries
D Garg, J Franklin, D Kaynar, A Datta
Electronic Notes in Theoretical Computer Science 265, 49-71, 2010
362010
Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size
J Franklin, S Chaki, A Datta, A Seshadri
2010 IEEE Symposium on Security and Privacy, 365-379, 2010
262010
On adversary models and compositional security
A Datta, J Franklin, D Garg, L Jia, D Kaynar
IEEE Security & Privacy 9 (3), 26-32, 2010
242010
Towards sound detection of virtual machines
J Franklin, M Luk, JM McCune, A Seshadri, A Perrig, L van Doorn
Botnet Detection, 89-116, 2008
192008
Parametric verification of address space separation
J Franklin, S Chaki, A Datta, JM McCune, A Vasudevan
International Conference on Principles of Security and Trust, 51-68, 2012
182012
PRISM: enabling personal verification of code integrity, untampered execution, and trusted i/o on legacy systems or human-verifiable code execution
J Franklin, M Luk, A Seshadri, A Perrig
Carnegie Mellon University, 2007
102007
Techniques for web application vulnerability scanning
J Franklin, Y Liu
US Patent 9,015,844, 2015
82015
The system can't perform the operation now. Try again later.
Articles 1–20