Justin CapposYunze ZhaoYuchen ZhangDan ChackoJustin CapposCovSBOM: Enhancing Software Bill of Materials with Integrated Code Coverage Analysis.228-2372024ISSREhttps://doi.org/10.1109/ISSRE62328.2024.00031conf/issre/2024db/conf/issre/issre2024.html#ZhaoZCC24Berat Can SenelMaxime MouchetJustin CapposTimur FriedmanOlivier FourmauxRick McGeerMultitenant Containers as a Service (CaaS) for Clouds and Edge Clouds.144574-144601202311IEEE Accesshttps://doi.org/10.1109/ACCESS.2023.3344486db/journals/access/access11.html#SenelMCFFM23Hammad AfzaliSantiago Torres-AriasReza CurtmolaJustin CapposTowards verifiable web-based code review systems.153-184202331J. Comput. Secur.2https://doi.org/10.3233/JCS-210098https://www.wikidata.org/entity/Q114943881db/journals/jcs/jcs31.html#AfzaliTCC23Marina MooreTrishank Karthik KuppusamyJustin CapposArtemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems.83-972023ACSAChttps://doi.org/10.1145/3627106.3627129conf/acsac/2023db/conf/acsac/acsac2023.html#MooreKC23Berat Can SenelMaxime MouchetJustin CapposOlivier FourmauxTimur FriedmanRick McGeerMultitenant Containers as a Service (CaaS) for Clouds and Edge Clouds.2023abs/2304.08927CoRRhttps://doi.org/10.48550/arXiv.2304.08927db/journals/corr/corr2304.html#abs-2304-08927Berat Can SenelMaxime MouchetJustin CapposTimur FriedmanOlivier FourmauxRick McGeerDemo: EdgeNet, a Production Internet-Scale Container-Based Distributed System Testbed.1298-13012022ICDCShttps://doi.org/10.1109/ICDCS54860.2022.00141conf/icdcs/2022db/conf/icdcs/icdcs2022.html#SenelMCFFM22Preston MooreThomas WiesMarc WaldmanPhyllis G. FranklJustin CapposNeedles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings.137-1452022ICSOFThttps://doi.org/10.5220/0011142300003266conf/icsoft/2022db/conf/icsoft/icsoft2022.html#MooreWWFC22Berat Can SenelMaxime MouchetJustin CapposTimur FriedmanOlivier FourmauxRick McGeerFederating EdgeNet with Fed4FIRE+ and Deploying its Nodes Behind NATs.1-52022IFIP Networkinghttps://doi.org/10.23919/IFIPNetworking55013.2022.9829758conf/networking/2022db/conf/networking/networking2022.html#SenelMCFFM22Sangat VaidyaSantiago Torres-AriasJustin CapposReza CurtmolaBootstrapping Trust in Community Repository Projects.450-4692022SecureCommhttps://doi.org/10.1007/978-3-031-25538-0_24conf/securecomm/2022db/conf/securecomm/securecomm2022.html#VaidyaTCC22Preston MooreJustin CapposCybersecurity Shuffle: Using Card Magic to Introduce Cybersecurity Concepts.10902022SIGCSE (2)https://doi.org/10.1145/3478432.3499081conf/sigcse/2022-2db/conf/sigcse/sigcse2022-2.html#MooreC21Berat Can SenelMaxime MouchetJustin CapposOlivier FourmauxTimur FriedmanRick McGeerEdgeNet: A Multi-Tenant and Multi-Provider Edge Cloud.49-542021EdgeSys@EuroSyshttps://doi.org/10.1145/3434770.3459737conf/eurosys/2021edgesysdb/conf/eurosys/edgesys2021.html#SenelMCFFM21Berat Can SenelMaxime MouchetJustin CapposOlivier FourmauxTimur FriedmanRick McGeerEdgeNet: the Global Kubernetes Cluster Testbed.1-22021INFOCOM Workshopshttps://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484475conf/infocom/2021wdb/conf/infocom/infocom2021w.html#SenelMCFFM21Hammad AfzaliSantiago Torres-AriasReza CurtmolaJustin CapposTowards adding verifiability to web-based Git repositories.405-436202028J. Comput. Secur.4https://doi.org/10.3233/JCS-191371https://www.wikidata.org/entity/Q114944664db/journals/jcs/jcs28.html#AfzaliTCC20Ghada AlmashaqbehAllison BishopJustin CapposMicroCash: Practical Concurrent Processing of Micropayments.227-2442020Financial Cryptographyhttps://doi.org/10.1007/978-3-030-51280-4_13conf/fc/2020db/conf/fc/fc2020.html#AlmashaqbehBC20Dan GopsteinAnne-Laure FayardSven ApelJustin CapposThinking aloud about confusing code: a qualitative investigation of program comprehension and atoms of confusion.605-6162020ESEC/SIGSOFT FSEhttps://doi.org/10.1145/3368089.3409714conf/sigsoft/2020db/conf/sigsoft/fse2020.html#GopsteinFAC20Ghada AlmashaqbehKevin KelleyAllison BishopJustin CapposCAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks.250-2582019CNShttps://doi.org/10.1109/CNS.2019.8802825conf/cns/2019db/conf/cns/cns2019.html#AlmashaqbehKBC19Ghada AlmashaqbehAllison BishopJustin CapposABC: A Cryptocurrency-Focused Threat Modeling Framework.859-8642019INFOCOM Workshopshttps://doi.org/10.1109/INFCOMW.2019.8845101conf/infocom/2019wdb/conf/infocom/infocom2019w.html#AlmashaqbehBC19Preston MooreJustin CapposPhyllis G. FranklThomas WiesCharting a Course Through Uncertain Environments: SEA Uses Past Problems to Avoid Future Failures.1-122019ISSREhttps://doi.org/10.1109/ISSRE.2019.00011conf/issre/2019db/conf/issre/issre2019.html#MooreCFW19Sangat VaidyaSantiago Torres-AriasReza CurtmolaJustin CapposCommit Signatures for Centralized Version Control Systems.359-3732019SEChttps://doi.org/10.1007/978-3-030-22312-0_25conf/sec/2019db/conf/sec/sec2019.html#VaidyaTCC19Santiago Torres-AriasHammad AfzaliTrishank Karthik KuppusamyReza CurtmolaJustin Capposin-toto: Providing farm-to-table guarantees for bits and bytes.1393-14102019USENIX Security Symposiumhttps://www.usenix.org/conference/usenixsecurity19/presentation/torres-ariasconf/uss/2019db/conf/uss/uss2019.html#Torres-AriasAKC19Ghada AlmashaqbehAllison BishopJustin CapposABC: A Cryptocurrency-Focused Threat Modeling Framework.2019abs/1903.03422CoRRhttp://arxiv.org/abs/1903.03422db/journals/corr/corr1903.html#abs-1903-03422Ghada AlmashaqbehKevin KelleyAllison BishopJustin CapposCAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks.2019abs/1906.10272CoRRhttp://arxiv.org/abs/1906.10272db/journals/corr/corr1906.html#abs-1906-10272Ghada AlmashaqbehAllison BishopJustin CapposMicroCash: Practical Concurrent Processing of Micropayments.2019abs/1911.08520CoRRhttp://arxiv.org/abs/1911.08520db/journals/corr/corr1911.html#abs-1911-08520Justin CapposYanyan ZhuangAlbert RafetsederIvan BeschastnikhTsumiki: A Meta-Platform for Building Your Own Testbed.2863-2881201829IEEE Trans. Parallel Distributed Syst.12https://doi.org/10.1109/TPDS.2018.2846242http://doi.ieeecomputersociety.org/10.1109/TPDS.2018.2846242db/journals/tpds/tpds29.html#CapposZRB18Trishank Karthik KuppusamyLois Anne DeLongJustin CapposUptane: Security and Customizability of Software Updates for Vehicles.66-73201813IEEE Veh. Technol. Mag.1https://doi.org/10.1109/MVT.2017.2778751https://www.wikidata.org/entity/Q113435770db/journals/vtm/vtm13.html#KuppusamyDC18Hammad AfzaliSantiago Torres-AriasReza CurtmolaJustin Capposle-git-imate: Towards Verifiable Web-based Git Repositories.469-4822018AsiaCCShttps://doi.org/10.1145/3196494.3196523conf/ccs/2018asiadb/conf/ccs/asiaccs2018.html#AfzaliTCC18Justin CapposMatthew HemmingsRick McGeerAlbert RafetsederGlenn RicartEdgeNet: A Global Cloud That Spreads by Local Action.359-3602018SEChttps://doi.org/10.1109/SEC.2018.00045https://doi.ieeecomputersociety.org/10.1109/SEC.2018.00045conf/edge/2018secdb/conf/edge/sec2018.html#CapposHMRR18Dan GopsteinHongwei Henry ZhouPhyllis G. FranklJustin CapposPrevalence of confusing code in software projects: atoms of confusion in the wild.281-2912018MSRhttps://doi.org/10.1145/3196398.3196432https://ieeexplore.ieee.org/document/8595211conf/msr/2018db/conf/msr/msr2018.html#GopsteinZFC18Igor KhokhlovLeon ReznikJustin CapposRohit BhaskarDesign of activity recognition systems with wearable sensors.1-62018SAShttps://doi.org/10.1109/SAS.2018.8336752conf/sas2/2018db/conf/sas2/sas2018.html#KhokhlovRCB18Yanyan ZhuangAlbert RafetsederRichard S. WeissJustin CapposFour years experience: Making sensibility testbed work for SAS.1-62018SAShttps://doi.org/10.1109/SAS.2018.8336779conf/sas2/2018db/conf/sas2/sas2018.html#ZhuangRWC18Daniela Seabra OliveiraTian LinMuhammad Sajidur RahmanRad AkefiradDonovan M. EllisEliany PerezRahul BobhateLois DeLongJustin CapposYuriy BrunAPI Blindspots: Why Experienced Developers Write Vulnerable Code.315-3282018SOUPS @ USENIX Security Symposiumhttps://www.usenix.org/conference/soups2018/presentation/oliveiraconf/soups/2018db/conf/soups/soups2018.html#OliveiraLRAEPBD18Yanyan ZhuangAlbert RafetsederYu HuYuan Tian 0001Justin CapposSensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps.113-1182018HotMobilehttps://doi.org/10.1145/3177102.3177120conf/wmcsa/2018db/conf/wmcsa/hotmobile2018.html#ZhuangRHTC18Sai Teja PeddintiKeith W. RossJustin CapposUser Anonymity on Twitter.84-87201715IEEE Secur. Priv.3https://doi.org/10.1109/MSP.2017.74http://doi.ieeecomputersociety.org/10.1109/MSP.2017.74db/journals/ieeesp/ieeesp15.html#PeddintiRC17Trishank Karthik KuppusamyLois DeLongJustin CapposSecuring Software Updates for Automotives Using Uptane.201742login Usenix Mag.2https://www.usenix.org/publications/login/summer2017/kuppusamydb/journals/usenix-login/usenix-login42.html#KuppusamyDC17Albert RafetsederLukas PühringerJustin CapposPractical fog computing with seattle.1-72017FWChttps://doi.org/10.1109/FWC.2017.8368519conf/fwc/2017db/conf/fwc/fwc2017.html#RafetsederPC17Dan GopsteinJake IannaconeYu YanLois DeLongYanyan ZhuangMartin K.-C. YehJustin CapposUnderstanding misunderstandings in source code.129-1392017ESEC/SIGSOFT FSEhttps://doi.org/10.1145/3106237.3106264https://www.wikidata.org/entity/Q56814241conf/sigsoft/2017db/conf/sigsoft/fse2017.html#GopsteinIYDZYC17Yiwen LiBrendan Dolan-GavittSam WeberJustin CapposLock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path.1-132017USENIX ATChttps://www.usenix.org/conference/atc17/technical-sessions/presentation/li-yiwenconf/usenix/2017db/conf/usenix/usenix2017.html#LiDWC17Trishank Karthik KuppusamyVladimir DiazJustin CapposMercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories.673-6882017USENIX ATChttps://www.usenix.org/conference/atc17/technical-sessions/presentation/kuppusamyconf/usenix/2017db/conf/usenix/usenix2017.html#KuppusamyDC17Kirill Nikitin 0001Eleftherios Kokoris-KogiasPhilipp JovanovicNicolas GaillyLinus GasserIsmail KhoffiJustin CapposBryan FordCHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.1271-12872017USENIX Security Symposiumhttps://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/nikitinconf/uss/2017db/conf/uss/uss2017.html#NikitinKJGGKCF17Sai Teja PeddintiKeith W. RossJustin CapposMining Anonymity: Identifying Sensitive Accounts on Twitter.2017abs/1702.00164CoRRhttp://arxiv.org/abs/1702.00164db/journals/corr/corr1702.html#PeddintiRC17Kirill Nikitin 0001Eleftherios Kokoris-KogiasPhilipp JovanovicLinus GasserNicolas GaillyIsmail KhoffiJustin CapposBryan FordCHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.64820172017IACR Cryptol. ePrint Arch.http://eprint.iacr.org/2017/648db/journals/iacr/iacr2017.html#NikitinKJGGKCF17Sai Teja PeddintiKeith W. RossJustin CapposFinding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity.655-6582016ICWSMhttp://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13063conf/icwsm/2016db/conf/icwsm/icwsm2016.html#PeddintiRC16Trishank Karthik KuppusamySantiago Torres-AriasVladimir DiazJustin CapposDiplomat: Using Delegations to Protect Community Repositories.567-5812016NSDIhttps://www.usenix.org/conference/nsdi16/technical-sessions/presentation/kuppusamyconf/nsdi/2016db/conf/nsdi/nsdi2016.html#KuppusamyTDC16Santiago Torres-AriasAnil Kumar AmmulaReza CurtmolaJustin CapposOn Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities.379-3952016USENIX Security Symposiumhttps://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/torres-ariasconf/uss/2016db/conf/uss/uss2016.html#Torres-AriasACC16Yanyan ZhuangAlbert RafetsederJustin CapposPrivacy-Preserving Experimentation with Sensibility Testbed.201540login Usenix Mag.4https://www.usenix.org/publications/login/aug15/zhuangdb/journals/usenix-login/usenix-login40.html#ZhuangRC15Luqin WangTrishank Karthik KuppusamyYong Liu 0013Justin CapposA Fast Multi-Server, Multi-Block Private Information Retrieval Protocol.1-62015GLOBECOMhttps://doi.org/10.1109/GLOCOM.2014.7417246conf/globecom/2015db/conf/globecom/globecom2015.html#WangKLC15Jeff RasleyEleni GessiouTony OhmannYuriy BrunShriram KrishnamurthiJustin CapposDetecting latent cross-platform API violations.484-4952015ISSREhttps://doi.org/10.1109/ISSRE.2015.7381841https://doi.ieeecomputersociety.org/10.1109/ISSRE.2015.7381841conf/issre/2015db/conf/issre/issre2015.html#RasleyGOBKC15Michael ReiningerSeth MillerYanyan ZhuangJustin CapposA first look at vehicle data collection via smartphone sensors.1-62015SAShttps://doi.org/10.1109/SAS.2015.7133607conf/sas2/2015db/conf/sas2/sas2015.html#ReiningerMZC15Sara HooshangiRichard S. WeissJustin CapposCan the Security Mindset Make Students Better Testers?404-4092015SIGCSEhttps://doi.org/10.1145/2676723.2677268conf/sigcse/2015db/conf/sigcse/sigcse2015.html#HooshangiWC15Richard S. WeissMichael E. LocastoJens MacheBlair TaylorElizabeth K. HawthorneJustin CapposAmbareen SirajTeaching Security Using Hands-on Exercises in 2015 (Abstract Only).6952015SIGCSEhttps://doi.org/10.1145/2676723.2691862https://www.wikidata.org/entity/Q58197435conf/sigcse/2015db/conf/sigcse/sigcse2015.html#WeissLMTHCS15Richard S. WeissLeon ReznikYanyan ZhuangAndrew HoffmanDarrell PollardAlbert RafetsederTao LiJustin CapposTrust Evaluation in Mobile Devices: An Empirical Study.25-322015TrustCom/BigDataSE/ISPA (1)https://doi.org/10.1109/Trustcom.2015.353conf/trustcom/2015-1db/conf/trustcom/trustcom2015-1.html#WeissRZHPRLC15Tao LiAlbert RafetsederRodrigo FonsecaJustin CapposFence: Protecting Device Availability With Uniform Resource Control.177-1912015USENIX ATChttps://www.usenix.org/conference/atc15/technical-session/presentation/liconf/usenix/2015db/conf/usenix/usenix2015.html#LiRFC15Marcelo MartinsJustin CapposRodrigo FonsecaSelectively Taming Background Android Apps to Improve Battery Lifetime.563-5752015USENIX ATChttps://www.usenix.org/conference/atc15/technical-session/presentation/martinsconf/usenix/2015db/conf/usenix/usenix2015.html#MartinsCF15Paul Müller 0001Dennis SchwerdelJustin CapposToMaTo a Virtual Research Environment for Large Scale Distributed Systems Research.23-32201437Prax. Inf.verarb. Kommun.1https://doi.org/10.1515/pik-2013-0043db/journals/pik/pik37.html#MullerSC14Santiago Torres-AriasJustin CapposPolyPasswordHasher: Improving Password Storage Security.201439login Usenix Mag.6https://www.usenix.org/publications/login/dec14/torresdb/journals/usenix-login/usenix-login39.html#Torres-AriasC14Daniela Oliveira 0001Marissa RosenthalNicole MorinKuo-Chuan (Martin) YehJustin CapposYanyan ZhuangIt's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots.296-3052014ACSAChttps://doi.org/10.1145/2664243.2664254conf/acsac/2014db/conf/acsac/acsac2014.html#OliveiraRMYCZ14Sai Teja PeddintiKeith W. RossJustin Cappos"On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks.83-942014COSNhttps://doi.org/10.1145/2660460.2660467conf/cosn/2014db/conf/cosn/cosn2014.html#PeddintiRC14Yanyan ZhuangLeonard LawAlbert RafetsederLai WangIvan BeschastnikhJustin CapposSensibility testbed: An internet-wide cloud platform for programmable exploration of mobile devices.139-1402014INFOCOM Workshopshttps://doi.org/10.1109/INFCOMW.2014.6849194conf/infocom/2014wdb/conf/infocom/infocom2014w.html#ZhuangLRWBC14Yanyan ZhuangEleni GessiouSteven PortzerFraida FundMonzur MuhammadIvan BeschastnikhJustin CapposNetCheck: Network Diagnoses from Blackbox Traces.115-1282014NSDIhttps://www.usenix.org/conference/nsdi14/technical-sessions/presentation/zhuangconf/nsdi/2014db/conf/nsdi/nsdi2014.html#ZhuangGPFMBC14Justin CapposYanyan ZhuangDaniela Oliveira 0001Marissa RosenthalKuo-Chuan (Martin) YehVulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes.53-622014NSPWhttps://doi.org/10.1145/2683467.2683472conf/nspw/2014db/conf/nspw/nspw2014.html#CapposZORY14Justin CapposLai WangRichard S. WeissYi YangYanyan ZhuangBlurSense: Dynamic fine-grained access control for smartphone privacy.329-3322014SAShttps://doi.org/10.1109/SAS.2014.6798970https://www.wikidata.org/entity/Q56814240conf/sas2/2014db/conf/sas2/sas2014.html#CapposWWYZ14Justin CapposRichard S. WeissTeaching the security mindset with reference monitors.523-5282014SIGCSEhttps://doi.org/10.1145/2538862.2538939conf/sigcse/2014db/conf/sigcse/sigcse2014.html#CapposW14Richard S. WeissMichael E. LocastoJens MacheElizabeth K. HawthorneJustin CapposTeaching security using hands-on exercises (abstract only).7362014SIGCSEhttps://doi.org/10.1145/2538862.2544257https://www.wikidata.org/entity/Q58197441conf/sigcse/2014db/conf/sigcse/sigcse2014.html#WeissLMHC14Albert RafetsederFlorian MetzgerLukas PühringerKurt TutschkuYanyan ZhuangJustin CapposSensorium - A Generic Sensor Framework.46201336Prax. Inf.verarb. Kommun.1https://doi.org/10.1515/pik-2012-0061db/journals/pik/pik36.html#RafetsederMPTZC13Justin CapposAvoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates.386-3942013Financial Cryptographyhttps://doi.org/10.1007/978-3-642-39884-1_33conf/fc/2013db/conf/fc/fc2013.html#Cappos13Yanyan ZhuangAlbert RafetsederJustin CapposExperience with Seattle: A Community Platform for Research and Education.37-442013GREEhttps://doi.org/10.1109/GREE.2013.16https://doi.ieeecomputersociety.org/10.1109/GREE.2013.16conf/gree/2013db/conf/gree/gree2013.html#ZhuangRC13Leandro CollaresChris MatthewsJustin CapposYvonne CoadyRick McGeerEt (smart) phone home!283-2882011SPLASH Workshopshttps://doi.org/10.1145/2095050.2095098conf/oopsla/2011wdb/conf/oopsla/splash2011w.html#CollaresMCCM11Justin SamuelNick MathewsonJustin CapposRoger DingledineSurvivable key compromise in software update systems.61-722010CCShttps://doi.org/10.1145/1866307.1866315conf/ccs/2010db/conf/ccs/ccs2010.html#SamuelMCD10Justin CapposArmon DadgarJeff RasleyJustin SamuelIvan BeschastnikhCosmin BarsanArvind KrishnamurthyThomas E. AndersonRetaining sandbox containment despite bugs in privileged memory-safe code.212-2232010CCShttps://doi.org/10.1145/1866307.1866332conf/ccs/2010db/conf/ccs/ccs2010.html#CapposDRSBBKA10Justin CapposJonathan JackyModel-based Testing Without a Model: Assessing Portability in the Seattle Testbed.2010SSVhttps://www.usenix.org/conference/ssv10/model-based-testing-without-model-assessing-portability-seattle-testbedconf/ssv/2010db/conf/ssv/ssv2010.html#CapposJ10Justin CapposAlejandro Estrella-BalderramaJ. Joseph FowlerStephen G. KobourovSimultaneous graph embedding with bends and circular arcs.173-182200942Comput. Geom.2https://doi.org/10.1016/j.comgeo.2008.05.003db/journals/comgeo/comgeo42.html#CapposEFK09Justin SamuelJustin CapposPackage Managers Still Vulnerable: How to Protect Your Systems.200934login Usenix Mag.1https://www.usenix.org/publications/login/february-2009-volume-34-number-1/package-managers-still-vulnerable-how-protectdb/journals/usenix-login/usenix-login34.html#SamuelC09Qin YinAdrian SchüpbachJustin CapposAndrew BaumannTimothy RoscoeRhizoma: A Runtime for Self-deploying, Self-managing Overlays.184-2042009Middlewarehttps://doi.org/10.1007/978-3-642-10445-9_10conf/middleware/2009db/conf/middleware/middleware2009.html#YinSCBR09Justin CapposIvan BeschastnikhArvind KrishnamurthyTom Anderson 0003Seattle: a platform for educational cloud computing.111-1152009SIGCSEhttps://doi.org/10.1145/1508865.1508905https://doi.org/10.1145/1539024.1508905https://www.wikidata.org/entity/Q56814242conf/sigcse/2009db/conf/sigcse/sigcse2009.html#CapposBKA09Justin CapposStork: Secure Package Management for VM Environments.2008University of Arizona, Tucson, USAhttps://www.base-search.net/Record/764bfbb16db409a7793ef3f1d258e47108f52b56f28a0cfaff775a68d6def3c0https://hdl.handle.net/10150/195385https://www.base-search.net/Record/123a0089a3ab52e85dfd77b332358395c8610a9ff3a82bbc24123d50f00a9ea2base-search.net (ftunivarizona:oai:arizona.openrepository.com:10150/195385)base-search.net (ftunivarizona:oai:repository.arizona.edu:10150/195385)Justin SamuelJeremy PlichtaJustin CapposCentralized Package Management Using Stork.200833login Usenix Mag.1https://www.usenix.org/publications/login/february-2008-volume-33-number-1/centralized-package-management-using-storkdb/journals/usenix-login/usenix-login33.html#SamuelPC08Justin CapposJustin SamuelScott M. BakerJohn H. HartmanA look in the mirror: attacks on package managers.565-5742008CCShttps://doi.org/10.1145/1455770.1455841https://www.wikidata.org/entity/Q56814239conf/ccs/2008db/conf/ccs/ccs2008.html#CapposSBH08Qin YinJustin CapposAndrew BaumannTimothy RoscoeDependable Self-Hosting Distributed Systems Using Constraints.2008HotDephttp://www.usenix.org/events/hotdep08/tech/full_papers/yin/yin.pdfconf/hotdep/2008db/conf/hotdep/hotdep2008.html#YinCBR08Justin CapposJohn H. HartmanSan Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest.147-1602008NSDIhttp://www.usenix.org/events/nsdi08/tech/full_papers/cappos/cappos.pdfconf/nsdi/2008db/conf/nsdi/nsdi2008.html#CapposH08Justin CapposScott M. BakerJeremy PlichtaDuy Nguyen 0002Jason HardiesMatt BorgardJeffry JohnstonJohn H. HartmanStork: Package Management for Distributed VM Environments.79-942007conf/lisa/2007LISAhttp://www.usenix.org/events/lisa07/tech/cappos.htmldb/conf/lisa/lisa2007.html#CapposBP0HBJH07Praveen Rao 0001Justin CapposVarun KhareBongki MoonBeichuan Zhang 0001Net-X: Unified Data-Centric Internet Services.2007NetDBhttps://www.usenix.org/conference/netdb-07/net-x-unified-data-centric-internet-servicesconf/nsdi/2007netdbdb/conf/nsdi/netdb2007.html#RaoCKMZ07Steve MuirLarry L. PetersonMarc E. FiuczynskiJustin CapposJohn H. HartmanPrivileged operations in the PlanetLab virtualised environment.75-88200640ACM SIGOPS Oper. Syst. Rev.1https://doi.org/10.1145/1113361.1113375db/journals/sigops/sigops40.html#MuirPFCH06Justin CapposAlejandro Estrella-BalderramaJ. Joseph FowlerStephen G. KobourovSimultaneous Graph Embedding with Bends and Circular Arcs.95-1072006conf/gd/2006GDhttps://doi.org/10.1007/978-3-540-70904-6_11db/conf/gd/gd2006.html#CapposEFK06Justin CapposJohn H. HartmanWhy It Is Hard to Build a Long-Running Service on PlanetLab.2005WORLDShttps://www.usenix.org/conference/worlds-05/why-it-hard-build-long-running-service-planetlabconf/fast/2005worldsdb/conf/fast/worlds2005.html#CapposH05Stephen G. KobourovKyriacos E. PavlouJustin CapposMichael SteppMark MilesAmanda WixtedCollaboration with DiamondTouch.986-9892005conf/interact/2005INTERACThttps://doi.org/10.1007/11555261_86db/conf/interact/interact2005.html#KobourovPCSMW05Steve MuirLarry L. PetersonMarc E. FiuczynskiJustin CapposJohn H. HartmanProper: Privileged Operations in a Virtualised System Environment.367-3702005conf/usenix/2005gUSENIX ATC, General Trackhttp://www.usenix.org/events/usenix05/tech/general/muir.htmldb/conf/usenix/usenix2005g.html#MuirPFCH05Hammad AfzaliRad AkefiradGhada A. Al-MashaqbehGhada AlmashaqbehAnil Kumar AmmulaThomas E. AndersonTom Anderson 0003Sven ApelScott M. BakerCosmin BarsanAndrew BaumannIvan BeschastnikhRohit BhaskarAllison BishopRahul BobhateMatt BorgardYuriy BrunDan ChackoYvonne CoadyLeandro CollaresReza CurtmolaArmon DadgarLois DeLongLois Anne DeLongVladimir DiazRoger DingledineBrendan Dolan-GavittDonovan M. EllisAlejandro Estrella-BalderramaAnne-Laure FayardMarc E. FiuczynskiRodrigo FonsecaBryan FordOlivier FourmauxJ. Joseph FowlerPhyllis G. FranklTimur FriedmanFraida FundNicolas GaillyLinus GasserEleni GessiouDaniel GopsteinDan GopsteinJason HardiesJohn H. HartmanElizabeth K. HawthorneMatt HemmingsMatthew HemmingsAndrew HoffmanSara HooshangiYu HuJake IannaconeJonathan JackyJeffry JohnstonPhilipp JovanovicKevin KelleyVarun KhareIsmail KhoffiIgor KhokhlovStephen G. KobourovEleftherios Kokoris-KogiasShriram KrishnamurthiArvind KrishnamurthyTrishank Karthik KuppusamyLeonard LawTao LiYiwen LiTian LinYong Liu 0013Michael E. LocastoJens MacheMarcelo MartinsNick MathewsonChris MatthewsRick McGeerFlorian MetzgerMark MilesSeth MillerBongki MoonMarina MoorePreston MooreNicole MorinMaxime MouchetMonzur MuhammadSteve MuirPaul Müller 0001Duy Nguyen 0002Kirill Nikitin 0001Tony OhmannDaniela Oliveira 0001Daniela Seabra OliveiraKyriacos E. PavlouSai Teja PeddintiEliany PerezLarry L. PetersonJeremy PlichtaDarrell PollardSteven PortzerLukas PühringerAlbert RafetsederMuhammad Sajidur RahmanPraveen Rao 0001Jeff RasleyMichael ReiningerLeon ReznikGlenn RicartTimothy RoscoeMarissa RosenthalKeith W. RossJustin SamuelAdrian SchüpbachDennis SchwerdelBerat Can SenelAmbareen SirajMichael SteppBlair TaylorYuan Tian 0001Santiago Torres-AriasKurt TutschkuSangat VaidyaMarc WaldmanLai WangLuqin WangSam WeberRichard Weiss 0001Richard S. WeissThomas WiesAmanda WixtedYu YanYi YangMartin K.-C. YehKuo-Chuan (Martin) YehQin YinBeichuan Zhang 0001Yuchen ZhangYunze ZhaoHongwei Henry ZhouYanyan Zhuang