Jason Franklin
Jason Franklin
Research Associate, Stanford University
Verified email at - Homepage
Cited by
Cited by
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
An inquiry into the nature and causes of the wealth of internet miscreants.
J Franklin, A Perrig, V Paxson, S Savage
Ccs 7, 375-388, 2007
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
J Franklin, D McCoy, P Tabriz, V Neagoe, JV Randwyk, D Sicker
USENIX Security Symposium 3 (2006), 16-89, 2006
Compatibility Is Not Transparency: VMM Detection Myths and Realities.
T Garfinkel, K Adams, A Warfield, J Franklin
HotOS, 2007
Mapping Internet Sensors with Probe Response Attacks.
J Bethencourt, J Franklin, MK Vernon
USENIX security symposium, 193-208, 2005
Replayer: Automatic protocol replay by binary analysis
J Newsome, D Brumley, J Franklin, D Song
Proceedings of the 13th ACM conference on Computer and communications …, 2006
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
2009 30th IEEE Symposium on Security and Privacy, 221-236, 2009
FAWN: A fast array of wimpy nodes
DG Andersen, J Franklin, M Kaminsky, A Phanishayee, L Tan, ...
Communications of the ACM 54 (7), 101-109, 2011
Energy-efficient cluster computing with FAWN: Workloads and implications
V Vasudevan, D Andersen, M Kaminsky, L Tan, J Franklin, I Moraru
Proceedings of the 1st International Conference on Energy-Efficient …, 2010
Remote detection of virtual machine monitors with fuzzy benchmarking
J Franklin, M Luk, JM McCune, A Seshadri, A Perrig, L Van Doorn
ACM SIGOPS Operating Systems Review 42 (3), 83-92, 2008
FAWNdamentally power-efficient clusters
V Vasudevan, J Franklin, D Andersen, A Phanishayee, L Tan, ...
Carnegie Mellon University, 2009
Attacking, repairing, and verifying SecVisor: A retrospective on the security of a hypervisor
J Franklin, A Seshadri, N Qu, S Chaki, A Datta
Technical Report CMU-CyLab-08-008, 2008
Compositional system security with interface-confined adversaries
D Garg, J Franklin, D Kaynar, A Datta
Electronic Notes in Theoretical Computer Science 265, 49-71, 2010
On adversary models and compositional security
A Datta, J Franklin, D Garg, L Jia, D Kaynar
IEEE Security & Privacy 9 (3), 26-32, 2010
Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size
J Franklin, S Chaki, A Datta, A Seshadri
2010 IEEE Symposium on Security and Privacy, 365-379, 2010
Towards sound detection of virtual machines
J Franklin, M Luk, JM McCune, A Seshadri, A Perrig, L Doorn
Botnet Detection: Countering the Largest Security Threat, 89-116, 2008
Parametric verification of address space separation
J Franklin, S Chaki, A Datta, JM McCune, A Vasudevan
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
Faceted application search
J Franklin, A Kashyap
US Patent 9,311,413, 2016
Techniques for web application vulnerability scanning
J Franklin, Y Liu
US Patent 9,015,844, 2015
PRISM: enabling personal verification of code integrity, untampered execution, and trusted i/o on legacy systems or human-verifiable code execution
J Franklin, M Luk, A Seshadri, A Perrig
Carnegie Mellon University, 2007
The system can't perform the operation now. Try again later.
Articles 1–20