Justin Cappos
Justin Cappos
Associate Professor of Computer Science and Engineering, NYU
Verified email at - Homepage
Cited by
Cited by
Seattle: a platform for educational cloud computing
J Cappos, I Beschastnikh, A Krishnamurthy, T Anderson
Proceedings of the 40th ACM technical symposium on Computer science …, 2009
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.
K Nikitin, E Kokoris-Kogias, P Jovanovic, N Gailly, L Gasser, I Khoffi, ...
USENIX Security Symposium, 1271-1287, 2017
Survivable key compromise in software update systems
J Samuel, N Mathewson, J Cappos, R Dingledine
Proceedings of the 17th ACM conference on Computer and communications …, 2010
A look in the mirror: Attacks on package managers
J Cappos, J Samuel, S Baker, JH Hartman
Proceedings of the 15th ACM conference on Computer and communications …, 2008
" On the internet, nobody knows you're a dog" a twitter case study of anonymity in social networks
ST Peddinti, KW Ross, J Cappos
Proceedings of the second ACM conference on Online social networks, 83-94, 2014
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots
D Oliveira, M Rosenthal, N Morin, KC Yeh, J Cappos, Y Zhuang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Understanding password database compromises
D Mirante, J Cappos
Dept. of Computer Science and Engineering Polytechnic Inst. of NYU, Tech …, 2013
API blindspots: Why experienced developers write vulnerable code
D Oliveira, T Lin, MS Rahman, R Akefirad, D Ellis, E Perez, R Bobhate, ...
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Retaining sandbox containment despite bugs in privileged memory-safe code
J Cappos, A Dadgar, J Rasley, J Samuel, I Beschastnikh, C Barsan, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Uptane: Securing software updates for automobiles
T Karthik, A Brown, S Awwad, D McCoy, R Bielawski, C Mott, S Lauzon, ...
International Conference on Embedded Security in Car, 1-11, 2016
Understanding misunderstandings in source code
D Gopstein, J Iannacone, Y Yan, L DeLong, Y Zhuang, MKC Yeh, ...
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
A first look at vehicle data collection via smartphone sensors
M Reininger, S Miller, Y Zhuang, J Cappos
2015 IEEE Sensors Applications Symposium (SAS), 1-6, 2015
Selectively taming background android apps to improve battery lifetime
M Martins, J Cappos, R Fonseca
2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 563-575, 2015
Diplomat: Using delegations to protect community repositories
TK Kuppusamy, S Torres-Arias, V Diaz, J Cappos
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
Netcheck: Network diagnoses from blackbox traces
Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ...
11th {USENIX} Symposium on Networked Systems Design and Implementation …, 2014
User anonymity on twitter
ST Peddinti, KW Ross, J Cappos
IEEE Security & Privacy 15 (3), 84-87, 2017
Package management security
J Cappos, J Samuel, S Baker, JH Hartman
University of Arizona Technical Report, 08-02, 2008
Stork: Package Management for Distributed VM Environments.
J Cappos, SM Baker, J Plichta, D Nguyen, J Hardies, M Borgard, ...
LISA 7, 1-16, 2007
Rhizoma: a runtime for self-deploying, self-managing overlays
Q Yin, A Schüpbach, J Cappos, A Baumann, T Roscoe
Middleware 2009: ACM/IFIP/USENIX, 10th International Middleware Conference …, 2009
Proper: Privileged operations in a virtualised system environment
S Muir, L Peterson, M Fiuczynski, J Cappos, J Hartman
Proc. USENIX’05, 367-370, 2005
The system can't perform the operation now. Try again later.
Articles 1–20