Follow
Justin Cappos
Justin Cappos
Associate Professor of Computer Science and Engineering, NYU
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Seattle: a platform for educational cloud computing
J Cappos, I Beschastnikh, A Krishnamurthy, T Anderson
Proceedings of the 40th ACM technical symposium on Computer science …, 2009
2372009
{CHAINIAC}: Proactive {Software-Update} transparency via collectively signed skipchains and verified builds
K Nikitin, E Kokoris-Kogias, P Jovanovic, N Gailly, L Gasser, I Khoffi, ...
26th USENIX Security Symposium (USENIX Security 17), 1271-1287, 2017
1792017
Survivable key compromise in software update systems
J Samuel, N Mathewson, J Cappos, R Dingledine
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1492010
A look in the mirror: Attacks on package managers
J Cappos, J Samuel, S Baker, JH Hartman
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1292008
" On the internet, nobody knows you're a dog" a twitter case study of anonymity in social networks
ST Peddinti, KW Ross, J Cappos
Proceedings of the second ACM conference on Online social networks, 83-94, 2014
1182014
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots
D Oliveira, M Rosenthal, N Morin, KC Yeh, J Cappos, Y Zhuang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1112014
Uptane: Securing software updates for automobiles
T Karthik, A Brown, S Awwad, D McCoy, R Bielawski, C Mott, S Lauzon, ...
International Conference on Embedded Security in Car, 1-11, 2016
892016
{API} blindspots: Why experienced developers write vulnerable code
DS Oliveira, T Lin, MS Rahman, R Akefirad, D Ellis, E Perez, R Bobhate, ...
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 315-328, 2018
852018
Understanding password database compromises
D Mirante, J Cappos
Dept. of Computer Science and Engineering Polytechnic Inst. of NYU, Tech …, 2013
782013
Understanding misunderstandings in source code
D Gopstein, J Iannacone, Y Yan, L DeLong, Y Zhuang, MKC Yeh, ...
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
722017
Retaining sandbox containment despite bugs in privileged memory-safe code
J Cappos, A Dadgar, J Rasley, J Samuel, I Beschastnikh, C Barsan, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
642010
Diplomat: Using delegations to protect community repositories
TK Kuppusamy, S Torres-Arias, V Diaz, J Cappos
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016
612016
Selectively taming background android apps to improve battery lifetime
M Martins, J Cappos, R Fonseca
2015 USENIX Annual Technical Conference (USENIX ATC 15), 563-575, 2015
552015
A first look at vehicle data collection via smartphone sensors
M Reininger, S Miller, Y Zhuang, J Cappos
2015 IEEE Sensors Applications Symposium (SAS), 1-6, 2015
522015
Uptane: Security and customizability of software updates for vehicles
TK Kuppusamy, LA DeLong, J Cappos
IEEE vehicular technology magazine 13 (1), 66-73, 2018
482018
User anonymity on twitter
ST Peddinti, KW Ross, J Cappos
IEEE Security & Privacy 15 (3), 84-87, 2017
482017
{Lock-in-Pop}: Securing Privileged Operating System Kernels by Keeping on the Beaten Path
Y Li, B Dolan-Gavitt, S Weber, J Cappos
2017 USENIX Annual Technical Conference (USENIX ATC 17), 1-13, 2017
472017
Measuring the fitness of fitness trackers
CG Bender, JC Hoffstot, BT Combs, S Hooshangi, J Cappos
2017 IEEE Sensors Applications Symposium (SAS), 1-6, 2017
462017
Package management security
J Cappos, J Samuel, S Baker, JH Hartman
University of Arizona Technical Report, 08-02, 2008
432008
{NetCheck}: Network Diagnoses from Blackbox Traces
Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ...
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
412014
The system can't perform the operation now. Try again later.
Articles 1–20