Follow
Jan J Werner
Jan J Werner
Red Hat
Verified email at redhat.com
Title
Cited by
Cited by
Year
SoK: The challenges, pitfalls, and perils of using hardware performance counters for security
S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose
2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019
1792019
No-execute-after-read: Preventing code disclosure in commodity software
J Werner, G Baltas, R Dallara, N Otterness, KZ Snow, F Monrose, ...
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
832016
Return to the zombie gadgets: Undermining destructive code reads via code inference attacks
KZ Snow, R Rogowski, J Werner, H Koo, F Monrose, M Polychronakis
2016 IEEE Symposium on Security and Privacy (SP), 954-968, 2016
562016
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves
J Werner, J Mason, M Antonakakis, M Polychronakis, F Monrose
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
452019
Integrating security modeling into embedded system design
M Eby, J Werner, G Karsai, A Ledeczi
14th Annual IEEE International Conference and Workshops on the Engineering …, 2007
452007
Security risks in asynchronous web servers: When performance optimizations amplify the impact of data-oriented attacks
M Morton, J Werner, P Kintis, K Snow, M Antonakakis, M Polychronakis, ...
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 167-182, 2018
292018
Model-based design of clinical information systems
J Mathe, J Werner, Y Lee, B Malin, A Ledeczi
Methods of Information in Medicine 47 (5), 399, 2008
182008
A fast and efficient source authentication solution for broadcasting in wireless sensor networks
T Wu, Y Cui, B Kusy, A Ledeczi, J Sallai, N Skirvin, J Werner, Y Xue
New Technologies, Mobility and Security, 53-63, 2007
172007
To Gamify or Not? On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention
M Malone, Y Wang, K James, M Anderegg, J Werner, F Monrose
Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021
152021
Methods, systems, and computer readable media for preventing code reuse attacks
JJ Werner, KZ Snow, NM Otterness, RJ Dallara, G Baltas, FN Monrose, ...
US Patent 10,628,589, 2020
132020
A modeling environment for patient portals
S Duncavage, J Mathe, J Werner, BA Malin, A Ledeczi, J Sztipanovits
AMIA Annual Symposium Proceedings 2007, 201, 2007
102007
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-) Behavior to Discover New Bugs
S Das, K James, J Werner, M Antonakakis, M Polychronakis, F Monrose
Annual Computer Security Applications Conference, 345-359, 2020
72020
Implementing a model-based design environment for clinical information systems
J Mathe, S Duncavage, J Werner, B Malin, A Ledeczi, J Sztipanovits
Sztipanovits et al.[83], 2007
72007
Platform-based design for clinical information systems
J Werner, JL Mathe, S Duncavage, B Malin, A Ledeczi, JN Jirjis, ...
2007 5th IEEE International Conference on Industrial Informatics 2, 749-754, 2007
62007
Embedded systems security co-design
M Eby, J Werner, G Karsai, A Ledeczi
ACM SIGBED Review 4 (2), 1-4, 2007
52007
Towards the security and privacy analysis of patient portals
JL Mathe, S Duncavage, J Werner, BA Malin, A Ledeczi, J Sztipanovits
ACM SIGBED Review 4 (2), 5-9, 2007
52007
Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises
F Monrose, J Werner
2018 IEEE Cybersecurity Development (SecDev), 132-133, 2018
2018
MICIS-A Model-Integrated Clinical Information System
J Mathe, J Werner, Y Lee, A Ledeczi, B Malin, J Sztipanovits
2008
Modeling and Simulation Tool Suite for Patient Portals
J Mathe, S Duncavage, J Werner, G Karsai, A Ledeczi, B Malin, ...
2007
Integration of Clinical Workflows with Privacy Policies on a Common Semantic Platform
J Werner, B Malin, Y Lee, ALJ Sztipanovits
The system can't perform the operation now. Try again later.
Articles 1–20