Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James Newsome is active.

Publication


Featured researches published by James Newsome.


acm workshop on programming languages and analysis for security | 2009

Measuring channel capacity to distinguish undue influence

James Newsome; Stephen McCamant; Dawn Song

The channel capacity of a program is a quantitative measure of the amount of control that the inputs to a program have over its outputs. Because it corresponds to worst-case assumptions about the probability distribution over those inputs, it is particularly appropriate for security applications where the inputs are under the control of an adversary. We introduce a family of complementary techniques for measuring channel capacity automatically using a decision procedure (SAT or #SAT solver), which give either exact or narrow probabilistic bounds.n We then apply these techniques to the problem of analyzing false positives produced by dynamic taint analysis used to detect control-flow hijacking in commodity software. Dynamic taint analysis is based on the principle that an attacker should not be able to control values such as function pointers and return addresses, but it uses a simple binary approximation of control that commonly leads to both false positive and false negative errors. Based on channel capacity, we propose a more refined quantitative measure of influence, which can effectively distinguish between true attacks and false positives. We use a practical implementation of our influence measuring techniques, integrated with a dynamic taint analysis operating on x86 binaries, to classify tainting warnings produced by vulnerable network servers, such as those attacked by the Blaster and SQL Slammer worms. Influence measurement correctly distinguishes real attacks from tainting false positives, a task that would otherwise need to be done manually.


Sigplan Notices | 2009

Measuring channel capacity to distinguish undue influence (abstract only)

James Newsome; Stephen McCamant; Dawn Song

The channel capacity of a program is a quantitative measure of the amount of control that the inputs to a program have over its outputs. Because it corresponds to worst-case assumptions about the probability distribution over those inputs, it is particularly appropriate for security applications where the inputs are under the control of an adversary. We introduce a family of complementary techniques for measuring channel capacity automatically using a decision procedure (SAT or #SAT solver), which give either exact or narrow probabilistic bounds.n We then apply these techniques to the problem of analyzing false positives produced by dynamic taint analysis used to detect control-flow hijacking in commodity software. Dynamic taint analysis is based on the principle that an attacker should not be able to control values such as function pointers and return addresses, but it uses a simple binary approximation of control that commonly leads to both false positive and false negative errors. Based on channel capacity, we propose a more refined quantitative measure of influence, which can effectively distinguish between true attacks and false positives. We use a practical implementation of our influence measuring techniques, integrated with a dynamic taint analysis operating on x86 binaries, to classify tainting warnings produced by vulnerable network servers, such as those attacked by the Blaster and SQL Slammer worms. Influence measurement correctly distinguishes real attacks from tainting false positives, a task that would otherwise need to be done manually.


Archive | 2011

Verfahren zum Manipulationsschutz von Sensordaten und Sensor hierzu

James Newsome; Robert Szerwinski; Jan Hayek


Archive | 2014

Systems and methods for maintaining integrity and secrecy in untrusted computing platforms

Jorge Guajardo Merchan; Emmanuel Kwame Owusu; Jonathan M. McCune; James Newsome; Amit Vasudevan; Adrian Perrig


Archive | 2013

DEVICE PAIRING WITH AUDIO FINGERPRINT ENCODINGS

James Newsome


Archive | 2010

Method and apparatus for authenticated encryption of audio

Marc Smaak; Stephan van Tienen; James Newsome; Torsten Schuetze


Archive | 2010

METHOD FOR PROTECTING SENSOR DATA FROM MANIPULATION AND SENSOR TO THAT END

James Newsome; Robert Szerwinski; Jan Hayek


Archive | 2014

MiniBox: A Two-Way Sandbox for x86 Native Code (CMU-CyLab-14-001)

Yanlin Li; Adrian Perrig; Jonathan M. McCune; James Newsome; Brandon S. Baker; Will Drewry


Archive | 2014

Systèmes et procédés permettant de conserver une intégrité et une confidentialité dans des plates-formes informatiques non sécurisées

Jorge Guajardo Merchan; Emmanuel Owusu; Jonathan M. McCune; James Newsome; Adrian Perrig; Amit Vasudevan


Archive | 2012

It’s an app. It’s a hypervisor. It’s a hypapp.: Design and Implementation of an eXtensible and Modular Hypervisor Framework (CMU-CyLab-12-014)

Amit Vasudevan; Jonathan M. McCune; James Newsome

Collaboration


Dive into the James Newsome's collaboration.

Top Co-Authors

Avatar

Amit Vasudevan

Association for Computing Machinery

View shared research outputs
Top Co-Authors

Avatar

Dawn Song

University of California

View shared research outputs
Top Co-Authors

Avatar

Emmanuel Owusu

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adrian Perrig

Industrial Technology Research Institute

View shared research outputs
Top Co-Authors

Avatar

Adrian Perrig

Industrial Technology Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge