Dan S. Wallach

According to our database1, Dan S. Wallach authored at least 117 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
On the security of ballot marking devices.
CoRR, 2019

Total Recall: Persistence of Passwords in Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

On the Usability of HTTPS Deployment.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
An Historical Analysis of the SEAndroid Policy Evolution.
CoRR, 2018

Removing Secrets from Android's TLS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

An Historical Analysis of the SEAndroid Policy Evolution.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Verification of STAR-Vote and Evaluation of FDR and ProVerif.
CoRR, 2017

Public Evidence from Secret Ballots.
CoRR, 2017

Clash Attacks and the STAR-Vote System.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

Verification of STAR-Vote and Evaluation of FDR and ProVerif.
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017

Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties.
CoRR, 2016

2015
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
ACM Trans. Internet Techn., 2015

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
IEEE Trans. Mob. Comput., 2015

Accountable wiretapping - or - I know they can hear you now.
Journal of Computer Security, 2015

Finding Tizen security bugs through whole-system static analysis.
CoRR, 2015

An Empirical Study of Mobile Ad Targeting.
CoRR, 2015

Known Unknowns: An Analysis of Twitter Censorship in Turkey.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Exploiting military OpSec through open-source vulnerabilities.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Users' Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching.
IEEE Trans. Emerging Topics Comput., 2014

Glider: A GPU Library Driver for Improved System Security.
CoRR, 2014

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
CoRR, 2014

Performance Analysis of Location Profile Routing.
CoRR, 2014

Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
CoRR, 2014

Smartphone security 'taint' what it used to be: technical perspective.
Commun. ACM, 2014

Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

Hardening Persona - Improving Federated Web Login.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Automated generation of web server fingerprints
CoRR, 2013

Longitudinal Analysis of Android Ad Library Permissions
CoRR, 2013

The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
CoRR, 2013

A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps.
CoRR, 2013

The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

A case of collusion: a study of the interface between ad libraries and their apps.
Proceedings of the SPSM'13, 2013

2012
AdSplit: Separating Smartphone Advertising from Applications.
;login:, 2012

Language Without Words: A Pointillist Model for Natural Language Processing
CoRR, 2012

Tracking and Quantifying Censorship on a Chinese Microblogging Site
CoRR, 2012

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
CoRR, 2012

A Pointillism Approach for Natural Language Processing of Social Media
CoRR, 2012

AdSplit: Separating smartphone advertising from applications
CoRR, 2012

AdSplit: Separating Smartphone Advertising from Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Language without words: A pointillist model for natural language processing.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

Accountable Wiretapping -or- I know they can hear you now.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Algorithmic DoS.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Authenticated Dictionaries: Real-World Costs and Trade-Offs.
ACM Trans. Inf. Syst. Secur., 2011

#h00t: Censorship Resistant Microblogging
CoRR, 2011

The BitTorrent Anonymity Marketplace
CoRR, 2011

Building Better Incentives for Robustness in BitTorrent
CoRR, 2011

Attacks on Local Searching Tools
CoRR, 2011

An Analysis of Chinese Search Engine Filtering
CoRR, 2011

Quire: Lightweight Provenance for Smart Phone Operating Systems
CoRR, 2011

Rebooting the CS publication process.
Commun. ACM, 2011

QUIRE: Lightweight Provenance for Smart Phone Operating Systems.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Technical perspective - Native Client: a clever alternative.
Commun. ACM, 2010

Building Incentives into Tor.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Opportunities and Limits of Remote Timing Attacks.
ACM Trans. Inf. Syst. Secur., 2009

Technical perspective - Tools for information to flow securely and Swift-ly.
Commun. ACM, 2009

VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Efficient Data Structures For Tamper-Evident Logging.
Proceedings of the 18th USENIX Security Symposium, 2009

Birds of a FETHR: open, decentralized micropublishing.
Proceedings of the 8th international conference on Peer-to-peer systems, 2009

Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries.
Proceedings of the Computer Security, 2009

2008
The Case for Networked Remote Voting Precincts.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

VoteBox: A Tamper-evident, Verifiable Electronic Voting System.
Proceedings of the 17th USENIX Security Symposium, 2008

Finding the Evidence in Tamper-Evident Logs.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Electronic voting machines versus traditional methods: improved preference, similar performance.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Creating the EVT Workshop.
;login:, 2007

Casting Votes in the Auditorium.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

2006
Performance analysis of TLS Web servers.
ACM Trans. Comput. Syst., 2006

Eclipse Attacks on Overlay Networks: Threats and Defenses.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Robotics-Based Location Sensing Using Wireless Ethernet.
Wireless Networks, 2005

Iterative Adaptation for Mobile Clients Using Existing APIs.
IEEE Trans. Parallel Distrib. Syst., 2005

Guest Editors' Introduction: Ad Hoc and P2P Security.
IEEE Internet Computing, 2005

Managing the Performance Impact of Web Security.
Electronic Commerce Research, 2005

Scrivener: Providing Incentives in Cooperative Content Distribution Systems.
Proceedings of the Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28, 2005

A Taxonomy of Rational Attacks.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

2004
On the feasibility of using wireless ethernet for indoor localization.
IEEE Trans. Robotics, 2004

Hack-a-Vote: Security Issues with Electronic Voting Systems.
IEEE Security & Privacy, 2004

Analysis of an Electronic Voting System.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

AP3: cooperative, decentralized anonymous communication.
Proceedings of the 11st ACM SIGOPS European Workshop, 2004

Practical robust localization over large-scale 802.11 wireless networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

2003
Run-time support for distributed sharing in safe languages.
ACM Trans. Comput. Syst., 2003

Wireless LAN location-sensing for security applications.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Denial of Service via Algorithmic Complexity Attacks.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Garbage Collector Memory Accounting in Language-Based Systems.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Collaboration and Multimedia Authoring on Mobile Devices.
Proceedings of the First International Conference on Mobile Systems, 2003

Enforcing Fair Sharing of Peer-to-Peer Resources.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

POST: A Secure, Resilient, Cooperative Messaging System.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

2002
Termination in language-based systems.
ACM Trans. Inf. Syst. Secur., 2002

Extensible Adaptation via Constraint Solving.
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002

Secure Routing for Structured Peer-to-Peer Overlay Networks.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002

Performance Analysis of TLS Web Servers.
Proceedings of the Network and Distributed System Security Symposium, 2002

Robotics-based location sensing using wireless ethernet.
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, 2002

A Survey of Peer-to-Peer Security Issues.
Proceedings of the Software Security -- Theories and Systems, 2002

Enforcing Java Run-Time Properties Using Bytecode Rewriting.
Proceedings of the Software Security -- Theories and Systems, 2002

Using wireless Ethernet for localization.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, September 30, 2002

Transactional Rollback for Language-Based Systems.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Copy Protection Technology is Doomed.
IEEE Computer, 2001

Reading Between the Lines: Lessons from the SDMI Challenge.
Proceedings of the 10th USENIX Security Symposium, 2001

Puppeteer: Component-based Adaptation for Mobile Computing.
Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems, 2001

Termination in Language-based Systems.
Proceedings of the Network and Distributed System Security Symposium, 2001

Reducing the Energy Usage of Office Applications.
Proceedings of the Middleware 2001, 2001

Architectures for Adaption Systems.
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001

2000
SAFKASI: a security mechanism for language-based systems.
ACM Trans. Softw. Eng. Methodol., 2000

Run-Time Support for Distributed Sharing in Typed Languages.
Proceedings of the Languages, 2000

1998
Understanding Java Stack Inspection.
Proceedings of the Security and Privacy, 1998

1997
Extensible Security Architecture for Java.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

1996
Java Security: From HotJava to Netscape and Beyond.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Flexible, extensible Java security using digital signatures.
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996

1994
Accelerated MPEG compression of dynamic polygonal scenes.
Proceedings of the 21th Annual Conference on Computer Graphics and Interactive Techniques, 1994


  Loading...