J. Alex Halderman

Affiliations:
  • Princeton University, USA


According to our database1, J. Alex Halderman authored at least 79 papers between 2002 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Logic and Accuracy Testing: A Fifty-State Review.
CoRR, 2022

2021
RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail.
CoRR, 2021

Challenges in cybersecurity: Lessons from biological defense systems.
CoRR, 2021

Security Analysis of the Democracy Live Online Voting System.
Proceedings of the 30th USENIX Security Symposium, 2021

Improving the Accuracy of Ballot Scanners Using Supervised Learning.
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021

2020
Running Refraction Networking for Real.
Proc. Priv. Enhancing Technol., 2020

Characterizing Transnational Internet Performance and the Great Bottleneck of China.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Can Voters Detect Malicious Manipulation of Ballot Marking Devices?
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Investigating Large Scale HTTPS Interception in Kazakhstan.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Imperfect forward secrecy: how Diffie-Hellman fails in practice.
Commun. ACM, 2019

UnclearBallot: Automated Ballot Image Manipulation.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits.
Proceedings of the Financial Cryptography and Data Security, 2019

On the Usability of HTTPS Deployment.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Conjure: Summoning Proxies from Unused Address Space.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Quack: Scalable Remote Measurement of Application-Layer Censorship.
Proceedings of the 27th USENIX Security Symposium, 2018

Tracking Certificate Misissuance in the Wild.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

403 Forbidden: A Global View of CDN Geoblocking.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
Security Challenges in an Increasingly Tangled Web.
Proceedings of the 26th International Conference on World Wide Web, 2017

Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

An ISP-Scale Deployment of TapDance.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017


The Security Impact of HTTPS Interception.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Initial measurements of the cuban street network.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
Measuring small subgroup attacks against Diffie-Hellman.
IACR Cryptol. ePrint Arch., 2016


A security analysis of police computer systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

An Internet-wide view of ICS devices.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Implementing Attestable kiosks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Content-based security for the web.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Towards a Complete View of the Certificate Ecosystem.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Measuring the Security Harm of TLS Crypto Shortcuts.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Android UI Deception Revisited: Attacks and Defenses.
Proceedings of the Financial Cryptography and Data Security, 2016

FTP: The Forgotten Cloud.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election.
Proceedings of the E-Voting and Identity - 5th International Conference, 2015

Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Umbra: Embedded Web Security Through Application-Layer Firewalls.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

A Search Engine Backed by Internet-Wide Scanning.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Green Lights Forever: Analyzing the Security of Traffic Infrastructure.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Zippier ZMap: Internet-Wide Scanning at 10 Gbps.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

TapDance: End-to-Middle Anticensorship without Flow Blocking.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Security Analysis of a Full-Body Scanner.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

An Internet-Wide View of Internet-Wide Scanning.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

The Matter of Heartbleed.
Proceedings of the 2014 Internet Measurement Conference, 2014

Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security.
Proceedings of the Financial Cryptography and Data Security, 2014

Security Analysis of the Estonian Internet Voting System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Elliptic Curve Cryptography in Practice.
IACR Cryptol. ePrint Arch., 2013

Illuminating the Security Issues Surrounding Lights-Out Server Management.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

ZMap: Fast Internet-wide Scanning and Its Security Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Internet Censorship in Iran: A First Look.
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013

Analysis of the HTTPS certificate ecosystem.
Proceedings of the 2013 Internet Measurement Conference, 2013

CAge: Taming Certificate Authorities by Inferring Restricted Scopes.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Attacking the Washington, D.C. Internet Voting System.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Telex: Anticensorship in the Network Infrastructure.
Proceedings of the 20th USENIX Security Symposium, 2011

Internet Censorship in China: Where Does the Filtering Occur?
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

Ethical Issues in E-Voting Security Analysis.
Proceedings of the Financial Cryptography and Data Security, 2011

Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
To Strengthen Security, Change Developers' Incentives.
IEEE Secur. Priv., 2010

Sketcha: a captcha based on line drawings of 3D models.
Proceedings of the 19th International Conference on World Wide Web, 2010

Crawling BitTorrent DHTs for Fun and Profit.
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Proceedings of the Network and Distributed System Security Symposium, 2010

Security analysis of India's electronic voting machines.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Lest we remember: cold-boot attacks on encryption keys.
Commun. ACM, 2009

Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Fingerprinting Blank Paper Using Commodity Scanners.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

2008
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

In Defense of Pseudorandom Sample Selection.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

2007
Security Analysis of the Diebold AccuVote-TS Voting Machine.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

Harvesting verifiable challenges from oblivious online sources.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Digital Rights Management, Spyware, and Security.
IEEE Secur. Priv., 2006

Lessons from the Sony CD DRM Episode.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

2005
A convenient method for securely managing passwords.
Proceedings of the 14th international conference on World Wide Web, 2005

2004
Privacy management for portable recording devices.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

New client puzzle outsourcing techniques for DoS resistance.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
A search engine for 3D models.
ACM Trans. Graph., 2003

Early experiences with a 3D model search engine.
Proceedings of the Proceeding of the Eighth International Conference on 3D Web Technology, 2003

2002
Evaluating New Copy-Prevention Techniques for Audio CDs.
Proceedings of the Security and Privacy in Digital Rights Management, 2002


  Loading...