default search action
James W. Mickens
Person information
- affiliation: Harvard University, Cambridge, MA, USA
- affiliation (former): Microsoft Research
- affiliation (former): University of Michigan, Electrical and Computer Engineering Division, Ann Arbor, MI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c47]Yang Zhou, Mark Wilkening, James Mickens, Minlan Yu:
SmartNIC Security Isolation in the Cloud with S-NIC. EuroSys 2024: 851-869 - [c46]Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams:
Holepunch: Fast, Secure File Deletion with Crash Consistency. SP 2024: 2705-2721 - 2023
- [c45]Xueyuan Han, James Mickens, Siddhartha Sen:
Splice: Efficiently Removing a User's Data from In-memory Application State. CCS 2023: 2989-3002 - [i6]Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams:
Holepunch: Fast, Secure File Deletion with Crash Consistency. IACR Cryptol. ePrint Arch. 2023: 1927 (2023) - 2022
- [c44]Yang Zhou, Hassan M. G. Wassel, Sihang Liu, Jiaqi Gao, James Mickens, Minlan Yu, Chris Kennelly, Paul Turner, David E. Culler, Henry M. Levy, Amin Vahdat:
Carbink: Fault-Tolerant Far Memory. OSDI 2022: 55-71 - 2021
- [c43]Ronny Ko, James Mickens, Blake Loring, Ravi Netravali:
Oblique: Accelerating Page Loads Using Symbolic Execution. NSDI 2021: 289-302 - [c42]James P. Roney, Troy Appel, Prateek Pinisetti, James Mickens:
Identifying Valuable Pointers in Heap Data. SP (Workshops) 2021: 373-382 - [c41]Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James W. Mickens, Margo I. Seltzer, Haifeng Chen:
SIGL: Securing Software Installations Through Deep Graph Learning. USENIX Security Symposium 2021: 2345-2362 - [e1]James Mickens, Renata Teixeira:
18th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2021, April 12-14, 2021. USENIX Association 2021 [contents] - 2020
- [c40]Varun Gandhi, James Mickens:
Rethinking Isolation Mechanisms for Datacenter Multitenancy. HotCloud 2020 - [c39]Xueyuan Han, James Mickens, Ashish Gehani, Margo I. Seltzer, Thomas F. J.-M. Pasquier:
Xanthus: Push-button Orchestration of Host Provenance Data Collection. P-RECS@HPDC 2020: 27-32 - [c38]Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. NDSS 2020 - [i5]Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats. CoRR abs/2001.01525 (2020) - [i4]Xueyuan Han, James Mickens, Ashish Gehani, Margo I. Seltzer, Thomas F. J.-M. Pasquier:
Xanthus: Push-button Orchestration of Host Provenance Data Collection. CoRR abs/2005.04717 (2020) - [i3]Xueyuan Han, Xiao Yu, Thomas F. J.-M. Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo I. Seltzer, Haifeng Chen:
SIGL: Securing Software Installations Through Deep Graph Learning. CoRR abs/2008.11533 (2020)
2010 – 2019
- 2019
- [c37]Ravi Netravali, James Mickens:
Reverb: Speculative Debugging for Web Applications. SoCC 2019: 428-440 - [c36]Ravi Netravali, Anirudh Sivaraman, James Mickens, Hari Balakrishnan:
WatchTower: Fast, Secure Mobile Page Loads Using Remote Dependency Resolution. MobiSys 2019: 430-443 - [c35]Frank Wang, Ronny Ko, James Mickens:
Riverbed: Enforcing User-defined Privacy Constraints in Distributed Web Services. NSDI 2019: 615-630 - 2018
- [c34]Ronny Ko, James Mickens:
DeadBolt: Securing IoT Deployments. ANRW 2018: 50-57 - [c33]Frank Wang, James Mickens, Nickolai Zeldovich:
Veil: Private Browsing Semantics Without Browser-side Assistance. NDSS 2018 - [c32]Ravi Netravali, Vikram Nathan, James Mickens, Hari Balakrishnan:
Vesper: Measuring Time-to-Interactivity for Web Pages. NSDI 2018: 217-231 - [c31]Ravi Netravali, James Mickens:
Prophecy: Accelerating Mobile Page Loads Using Final-state Write Logs. NSDI 2018: 249-266 - [c30]James Larisch, James Mickens, Eddie Kohler:
Alto: lightweight VMs using virtualization-aware managed runtimes. ManLang 2018: 8:1-8:7 - [c29]Ravi Netravali, James Mickens:
Remote-Control Caching: Proxy-based URL Rewriting to Decrease Mobile Browsing Bandwidth. HotMobile 2018: 63-68 - [i2]John Vilk, Emery D. Berger, James Mickens, Mark Marron:
McFly: Time-Travel Debugging for the Web. CoRR abs/1810.11865 (2018) - 2017
- [c28]Frank Wang, Yuna Joung, James Mickens:
Cobweb: Practical Remote Attestation Using Contextual Graphs. SysTEX@SOSP 2017: 3:1-3:7 - 2016
- [c27]Ravi Netravali, Ameesh Goyal, James Mickens, Hari Balakrishnan:
Polaris: Faster Page Loads Using Fine-grained Dependency Tracking. NSDI 2016: 123-136 - [c26]Frank Wang, James Mickens, Nickolai Zeldovich, Vinod Vaikuntanathan:
Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. NSDI 2016: 611-626 - 2015
- [c25]Jelle van den Hooff, David Lazar, James Mickens:
Mjölnir: The Magical Web Application Hammer. APSys 2015: 11:1-11:8 - [c24]Ding Li, James Mickens, Suman Nath, Lenin Ravindranath:
Domino: understanding wide-area, asynchronous event causality in web applications. SoCC 2015: 182-188 - [c23]Tej Chajed, Jon Gjengset, Jelle van den Hooff, M. Frans Kaashoek, James Mickens, Robert Tappan Morris, Nickolai Zeldovich:
Amber: Decoupling User Data from Web Applications. HotOS 2015 - [c22]Ravi Netravali, Anirudh Sivaraman, Somak Das, Ameesh Goyal, Keith Winstein, James Mickens, Hari Balakrishnan:
Mahimahi: Accurate Record-and-Replay for HTTP. USENIX ATC 2015: 417-429 - 2014
- [j4]James Mickens:
The Saddest Moment. login Usenix Mag. 39(3) (2014) - [c21]James W. Mickens, Edmund B. Nightingale, Jeremy Elson, Darren Gehring, Bin Fan, Asim Kadav, Vijay Chidambaram, Osama Khan, Krishna Nareddy:
Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious Applications. NSDI 2014: 257-273 - [c20]James Mickens:
Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains. IEEE Symposium on Security and Privacy 2014: 261-275 - 2013
- [c19]Jacob R. Lorch, Bryan Parno, James W. Mickens, Mariana Raykova, Joshua Schiffman:
Shroud: ensuring private access to large-scale data in the data center. FAST 2013: 199-214 - 2012
- [c18]James Mickens:
Rivet: Browser-agnostic Remote Debugging for Web Applications. USENIX ATC 2012: 333-345 - [c17]James Mickens, Matthew Finifter:
Jigsaw: Efficient, Low-effort Mashup Isolation. WebApps 2012: 13-25 - [c16]Kaisen Lin, David Chu, James Mickens, Li Zhuang, Feng Zhao, Jian Qiu:
Gibraltar: Exposing Hardware Devices to Web Pages Using AJAX. WebApps 2012: 75-87 - [i1]Jacob R. Lorch, James W. Mickens, Bryan Parno, Mariana Raykova, Joshua Schiffman:
Toward Practical Private Access to Data Centers via Parallel ORAM. IACR Cryptol. ePrint Arch. 2012: 133 (2012) - 2011
- [c15]James W. Mickens, Mohan Dhawan:
Atlantis: robust, extensible execution environments for web applications. SOSP 2011: 217-231 - [c14]Bryan Parno, Jacob R. Lorch, John R. Douceur, James W. Mickens, Jonathan M. McCune:
Memoir: Practical State Continuity for Protected Modules. IEEE Symposium on Security and Privacy 2011: 379-394 - 2010
- [c13]John R. Douceur, James W. Mickens, Thomas Moscibroda, Debmalya Panigrahi:
Collaborative Measurements of Upload Speeds in P2P Systems. INFOCOM 2010: 1082-1090 - [c12]James W. Mickens, Jeremy Elson, Jon Howell, Jay R. Lorch:
Crom: Faster Web Browsing Using Speculative Execution. NSDI 2010: 127-142 - [c11]James W. Mickens, Jeremy Elson, Jon Howell:
Mugshot: Deterministic Capture and Replay for JavaScript Applications. NSDI 2010: 159-174 - [c10]James Mickens:
Silo: Exploiting JavaScript and DOM Storage for Faster Page Loads. WebApps 2010
2000 – 2009
- 2009
- [j3]James W. Mickens, Dilma Da Silva:
SOSP diversity workshop. ACM SIGOPS Oper. Syst. Rev. 43(4): 90-91 (2009) - [c9]John R. Douceur, James W. Mickens, Thomas Moscibroda, Debmalya Panigrahi:
ThunderDome: discovering upload constraints using decentralized bandwidth tournaments. CoNEXT 2009: 193-204 - [c8]John R. Douceur, James W. Mickens, Thomas Moscibroda, Debmalya Panigrahi:
Brief announcement: collaborative measurement of upload speeds in P2P systems. PODC 2009: 338-339 - [c7]James W. Mickens, John R. Douceur, William J. Bolosky, Brian D. Noble:
StrobeLight: Lightweight Availability Mapping and Anomaly Detection. USENIX ATC 2009 - 2008
- [b1]James W. Mickens:
Exploiting Host Availability in Distributed Systems. University of Michigan, USA, 2008 - 2007
- [c6]James W. Mickens, Brian D. Noble:
Concilium: Collaborative Diagnosis of Broken Overlay Routes. DSN 2007: 225-234 - [c5]James W. Mickens, Brian D. Noble:
Analytical Models for Epidemics in Mobile Networks. WiMob 2007: 77 - 2006
- [j2]James W. Mickens, Brian D. Noble:
Improving distributed system performance using machine availability prediction. SIGMETRICS Perform. Evaluation Rev. 34(2): 16-18 (2006) - [c4]James W. Mickens, Brian D. Noble:
Exploiting Availability Prediction in Distributed Systems. NSDI 2006 - 2005
- [c3]James W. Mickens, Brian D. Noble:
Predicting node availability in peer-to-peer networks. SIGMETRICS 2005: 378-379 - [c2]James W. Mickens, Brian D. Noble:
Modeling epidemic spreading in mobile environments. Workshop on Wireless Security 2005: 77-86 - 2004
- [c1]Magesh Jayapandian, Brian D. Noble, James W. Mickens, H. V. Jagadish:
Using Delay to Defend Against Database Extraction. Secure Data Management 2004: 202-218 - 2003
- [j1]James W. Mickens, Marco Gruteser, Justin Mazzola Paluska, Mary Baker:
MobiSys 2003: On the Cutting Edge in San Francisco. IEEE Pervasive Comput. 2(3): 81-84 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 23:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint