Jonathan M. Smith
Affiliations: | Computer and Information Science | University of Pennsylvania, Philadelphia, PA, United States |
Area:
Networks: Networked Systems; Security and PrivacyGoogle:
"Jonathan M Smith"Bio:
https://govinfo.library.unt.edu/acoas/nominations/smithjm.htm
DOI: 10.7916/D8SB4DTV ... my advisor, Gerald Quentin Maguire, Jr.
Parents
Sign in to add mentorGerald Quentin Maguire | grad student | 1989 | Columbia | |
(Concurrent Execution of Mutually Exclusive Alternatives) |
Children
Sign in to add traineeKlara Nahrstedt | grad student | 1995 | Penn |
Angelos D. Keromytis | grad student | 2001 | Penn |
Stephen J. Muir | grad student | 2001 | Penn |
Sotiris Ioannidis | grad student | 2005 | Penn |
Adam J. Aviv | grad student | 2012 | Penn |
Joel Hypolite | grad student | 2023 | Penn |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Sturton C, Hicks M, King ST, et al. (2019) FinalFilter: Asserting Security Properties of a Processor at Runtime Ieee Micro. 39: 35-42 |
Dhawan U, Hriţcu C, Rubin R, et al. (2015) Architectural support for software-defined metadata processing International Conference On Architectural Support For Programming Languages and Operating Systems - Asplos. 2015: 487-502 |
Sonchack J, Aviv AJ, Keller E, et al. (2015) OFX: Enabling OpenFlow extensions for switch-level security applications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1678-1680 |
Kwon A, Zhang K, Lim PL, et al. (2015) RotoRouter: Router support for endpoint-authorized decentralized traffic filtering to prevent DoS attacks Proceedings of the 2014 International Conference On Field-Programmable Technology, Fpt 2014. 183-190 |
Sonchack J, Aviv AJ, Smith JM. (2015) Cross-domain collaboration for improved IDS rule set selection Journal of Information Security and Applications. 24: 25-40 |
Aviv AJ, Blaze M, Sherr M, et al. (2014) Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43 |
Kwon A, Dhawan U, Smith JM, et al. (2013) Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security Proceedings of the Acm Conference On Computer and Communications Security. 721-732 |
Chiricescu S, Dehon A, Demange D, et al. (2013) SAFE: A clean-slate architecture for secure systems 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 570-576 |
Aviv AJ, Sapp B, Blaze M, et al. (2012) Practicality of accelerometer side channels on smartphones Acm International Conference Proceeding Series. 41-50 |
Arye M, Kiefer R, Super K, et al. (2012) Increasing network resilience through edge diversity in NEBULA Mobile Computing and Communications Review. 16: 14-20 |