Justin Cappos
Justin Cappos
Associate Professor of Computer Science and Engineering, NYU
Verified email at - Homepage
Cited by
Cited by
Seattle: a platform for educational cloud computing
J Cappos, I Beschastnikh, A Krishnamurthy, T Anderson
Proceedings of the 40th ACM technical symposium on Computer science …, 2009
{CHAINIAC}: Proactive {Software-Update} Transparency via Collectively Signed Skipchains and Verified Builds
K Nikitin, E Kokoris-Kogias, P Jovanovic, N Gailly, L Gasser, I Khoffi, ...
26th USENIX Security Symposium (USENIX Security 17), 1271-1287, 2017
Survivable key compromise in software update systems
J Samuel, N Mathewson, J Cappos, R Dingledine
Proceedings of the 17th ACM conference on Computer and communications …, 2010
A look in the mirror: Attacks on package managers
J Cappos, J Samuel, S Baker, JH Hartman
Proceedings of the 15th ACM conference on Computer and communications …, 2008
" On the internet, nobody knows you're a dog" a twitter case study of anonymity in social networks
ST Peddinti, KW Ross, J Cappos
Proceedings of the second ACM conference on Online social networks, 83-94, 2014
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots
D Oliveira, M Rosenthal, N Morin, KC Yeh, J Cappos, Y Zhuang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
{API} Blindspots: Why Experienced Developers Write Vulnerable Code
DS Oliveira, T Lin, MS Rahman, R Akefirad, D Ellis, E Perez, R Bobhate, ...
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 315-328, 2018
Understanding password database compromises
D Mirante, J Cappos
Dept. of Computer Science and Engineering Polytechnic Inst. of NYU, Tech …, 2013
Uptane: Securing software updates for automobiles
T Karthik, A Brown, S Awwad, D McCoy, R Bielawski, C Mott, S Lauzon, ...
International Conference on Embedded Security in Car, 1-11, 2016
Understanding misunderstandings in source code
D Gopstein, J Iannacone, Y Yan, L DeLong, Y Zhuang, MKC Yeh, ...
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
Retaining sandbox containment despite bugs in privileged memory-safe code
J Cappos, A Dadgar, J Rasley, J Samuel, I Beschastnikh, C Barsan, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Selectively taming background android apps to improve battery lifetime
M Martins, J Cappos, R Fonseca
2015 USENIX Annual Technical Conference (USENIX ATC 15), 563-575, 2015
A first look at vehicle data collection via smartphone sensors
M Reininger, S Miller, Y Zhuang, J Cappos
2015 IEEE Sensors Applications Symposium (SAS), 1-6, 2015
Diplomat: Using delegations to protect community repositories
TK Kuppusamy, S Torres-Arias, V Diaz, J Cappos
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016
User anonymity on twitter
ST Peddinti, KW Ross, J Cappos
IEEE Security & Privacy 15 (3), 84-87, 2017
{Lock-in-Pop}: Securing Privileged Operating System Kernels by Keeping on the Beaten Path
Y Li, B Dolan-Gavitt, S Weber, J Cappos
2017 USENIX Annual Technical Conference (USENIX ATC 17), 1-13, 2017
{NetCheck}: Network Diagnoses from Blackbox Traces
Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ...
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
Package management security
J Cappos, J Samuel, S Baker, JH Hartman
University of Arizona Technical Report, 08-02, 2008
Stork: Package Management for Distributed VM Environments.
J Cappos, SM Baker, J Plichta, D Nguyen, J Hardies, M Borgard, ...
LISA 7, 1-16, 2007
Rhizoma: a runtime for self-deploying, self-managing overlays
Q Yin, A Schüpbach, J Cappos, A Baumann, T Roscoe
Middleware 2009: ACM/IFIP/USENIX, 10th International Middleware Conference …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20