Dan S. Wallach

Affiliations:
  • Rice University, Houston, Department of Computer Science


According to our database1, Dan S. Wallach authored at least 117 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Ballot Tabulation Using Deep Learning.
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023

2022
Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use.
Hum. Factors, 2022

Election Security: Risk Limiting Audits
ACM TechBrief 5, ACM, 2022

2021
Bad Tools Hurt: Lessons for teaching computer security skills to undergraduates.
Int. J. Comput. Sci. Educ. Sch., 2021

VAULT-Style Risk-Limiting Audits and the Inyo County Pilot.
IEEE Secur. Priv., 2021

Machine Learning for Measuring and Analyzing Online Social Communications.
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021

2020
Scaling Up Anonymous Communication with Efficient Nanopayment Channels.
Proc. Priv. Enhancing Technol., 2020

How Human Factors Can Help Preserve Democracy in the Age of Pandemics.
Hum. Factors, 2020

The Design and Implementation of a Verified File System with End-to-End Data Integrity.
CoRR, 2020

2019
Sub-Linear Privacy-Preserving Near-Neighbor Search.
IACR Cryptol. ePrint Arch., 2019

Investigating the effectiveness of web adblockers.
CoRR, 2019

On the security of ballot marking devices.
CoRR, 2019

Total Recall: Persistence of Passwords in Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

On the Usability of HTTPS Deployment.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Removing Secrets from Android's TLS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

An Historical Analysis of the SEAndroid Policy Evolution.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Picking up the trash: Exploiting generational GC for memory analysis.
Digit. Investig., 2017

Clash Attacks and the STAR-Vote System.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

Verification of STAR-Vote and Evaluation of FDR and ProVerif.
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017

Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties.
CoRR, 2016

2015
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
ACM Trans. Internet Techn., 2015

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
IEEE Trans. Mob. Comput., 2015

Accountable wiretapping - or - I know they can hear you now.
J. Comput. Secur., 2015

Finding Tizen security bugs through whole-system static analysis.
CoRR, 2015

An Empirical Study of Mobile Ad Targeting.
CoRR, 2015

Known Unknowns: An Analysis of Twitter Censorship in Turkey.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Exploiting military OpSec through open-source vulnerabilities.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Users' Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching.
IEEE Trans. Emerg. Top. Comput., 2014

Glider: A GPU Library Driver for Improved System Security.
CoRR, 2014

Performance Analysis of Location Profile Routing.
CoRR, 2014

Smartphone security 'taint' what it used to be: technical perspective.
Commun. ACM, 2014

Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

Hardening Persona - Improving Federated Web Login.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Automated generation of web server fingerprints
CoRR, 2013

Longitudinal Analysis of Android Ad Library Permissions
CoRR, 2013

The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

A case of collusion: a study of the interface between ad libraries and their apps.
Proceedings of the SPSM'13, 2013

2012
AdSplit: Separating Smartphone Advertising from Applications.
login Usenix Mag., 2012

Tracking and Quantifying Censorship on a Chinese Microblogging Site
CoRR, 2012

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
CoRR, 2012

A Pointillism Approach for Natural Language Processing of Social Media
CoRR, 2012

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Language without words: A pointillist model for natural language processing.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Algorithmic DoS.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Authenticated Dictionaries: Real-World Costs and Trade-Offs.
ACM Trans. Inf. Syst. Secur., 2011

#h00t: Censorship Resistant Microblogging
CoRR, 2011

The BitTorrent Anonymity Marketplace
CoRR, 2011

Building Better Incentives for Robustness in BitTorrent
CoRR, 2011

Attacks on Local Searching Tools
CoRR, 2011

An Analysis of Chinese Search Engine Filtering
CoRR, 2011

Rebooting the CS publication process.
Commun. ACM, 2011

QUIRE: Lightweight Provenance for Smart Phone Operating Systems.
Proceedings of the 20th USENIX Security Symposium, 2011

Using predictable mobility patterns to support scalable and secure MANETs of handheld devices.
Proceedings of the sixth international workshop on MobiArch, MobiArch '11, Bethesda, 2011

2010
Technical perspective - Native Client: a clever alternative.
Commun. ACM, 2010

Building Incentives into Tor.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Opportunities and Limits of Remote Timing Attacks.
ACM Trans. Inf. Syst. Secur., 2009

Technical perspective - Tools for information to flow securely and Swift-ly.
Commun. ACM, 2009

VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Efficient Data Structures For Tamper-Evident Logging.
Proceedings of the 18th USENIX Security Symposium, 2009

Birds of a FETHR: open, decentralized micropublishing.
Proceedings of the 8th international conference on Peer-to-peer systems, 2009

Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries.
Proceedings of the Computer Security, 2009

2008
The Case for Networked Remote Voting Precincts.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

VoteBox: A Tamper-evident, Verifiable Electronic Voting System.
Proceedings of the 17th USENIX Security Symposium, 2008

Finding the Evidence in Tamper-Evident Logs.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Electronic voting machines versus traditional methods: improved preference, similar performance.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Creating the EVT Workshop.
login Usenix Mag., 2007

Casting Votes in the Auditorium.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

2006
Performance analysis of TLS Web servers.
ACM Trans. Comput. Syst., 2006

Eclipse Attacks on Overlay Networks: Threats and Defenses.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Robotics-Based Location Sensing Using Wireless Ethernet.
Wirel. Networks, 2005

Iterative Adaptation for Mobile Clients Using Existing APIs.
IEEE Trans. Parallel Distributed Syst., 2005

Guest Editors' Introduction: Ad Hoc and P2P Security.
IEEE Internet Comput., 2005

Managing the Performance Impact of Web Security.
Electron. Commer. Res., 2005

Scrivener: Providing Incentives in Cooperative Content Distribution Systems.
Proceedings of the Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28, 2005

A Taxonomy of Rational Attacks.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

2004
On the feasibility of using wireless ethernet for indoor localization.
IEEE Trans. Robotics, 2004

Hack-a-Vote: Security Issues with Electronic Voting Systems.
IEEE Secur. Priv., 2004

Analysis of an Electronic Voting System.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

AP3: cooperative, decentralized anonymous communication.
Proceedings of the 11st ACM SIGOPS European Workshop, 2004

Practical robust localization over large-scale 802.11 wireless networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

2003
Run-time support for distributed sharing in safe languages.
ACM Trans. Comput. Syst., 2003

Wireless LAN location-sensing for security applications.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Denial of Service via Algorithmic Complexity Attacks.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Garbage Collector Memory Accounting in Language-Based Systems.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Collaboration and Multimedia Authoring on Mobile Devices.
Proceedings of the First International Conference on Mobile Systems, 2003

Enforcing Fair Sharing of Peer-to-Peer Resources.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

POST: A Secure, Resilient, Cooperative Messaging System.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

2002
Termination in language-based systems.
ACM Trans. Inf. Syst. Secur., 2002

Extensible Adaptation via Constraint Solving.
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002

Secure Routing for Structured Peer-to-Peer Overlay Networks.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002

Robotics-based location sensing using wireless ethernet.
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, 2002

A Survey of Peer-to-Peer Security Issues.
Proceedings of the Software Security -- Theories and Systems, 2002

Enforcing Java Run-Time Properties Using Bytecode Rewriting.
Proceedings of the Software Security -- Theories and Systems, 2002

Using wireless Ethernet for localization.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, September 30, 2002

Transactional Rollback for Language-Based Systems.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Copy Protection Technology is Doomed.
Computer, 2001

Reading Between the Lines: Lessons from the SDMI Challenge.
Proceedings of the 10th USENIX Security Symposium, 2001

Puppeteer: Component-based Adaptation for Mobile Computing.
Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems, 2001

Termination in Language-based Systems.
Proceedings of the Network and Distributed System Security Symposium, 2001

Reducing the Energy Usage of Office Applications.
Proceedings of the Middleware 2001, 2001

Architectures for Adaption Systems.
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001

2000
SAFKASI: a security mechanism for language-based systems.
ACM Trans. Softw. Eng. Methodol., 2000

Run-Time Support for Distributed Sharing in Typed Languages.
Proceedings of the Languages, 2000

1998
Understanding Java Stack Inspection.
Proceedings of the Security and Privacy, 1998

1997
Extensible Security Architecture for Java.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

1996
Java Security: From HotJava to Netscape and Beyond.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Flexible, extensible Java security using digital signatures.
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996

1994
Accelerated MPEG compression of dynamic polygonal scenes.
Proceedings of the 21th Annual Conference on Computer Graphics and Interactive Techniques, 1994


  Loading...