Simson L. Garfinkel

According to our database1, Simson L. Garfinkel authored at least 74 papers between 1995 and 2019.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2012, "For contributions to digital forensics and to computer security education.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Understanding database reconstruction attacks on public data.
Commun. ACM, 2019

2018
Issues Encountered Deploying Differential Privacy.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

2017
Toward algorithmic transparency and accountability.
Commun. ACM, 2017

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

Comparing the Usability of Cryptographic APIs.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Organizational practices in cryptographic development and testing.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Secure and Usable Enterprise Authentication: Lessons from the Field.
IEEE Security & Privacy, 2016

Privacy-Preserving IR 2016: Differential Privacy, Search, and Social Media.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016

2015
The Expanding World of Digital Forensics.
;login:, 2015

Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb.
Digital Investigation, 2015

2014
Usable Security: History, Themes, and Challenges
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2014

Can We Sniff Wi-Fi?: Implications of Joffe v. Google.
IEEE Security & Privacy, 2014

Leaking Sensitive Information in Complex Document Files-and How to Prevent It.
IEEE Security & Privacy, 2014

Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus.
Proceedings of the Advances in Digital Forensics X, 2014

2013
Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.
JDFSL, 2013

Digital media triage with bulk data analysis and bulk_extractor.
Computers & Security, 2013

2012
Programming Unicode.
;login:, 2012

Column: Factors Affecting Data Decay.
JDFSL, 2012

Digital forensics XML and the DFXML toolset.
Digital Investigation, 2012

Distinct Sector Hashes for Target File Detection.
IEEE Computer, 2012

The cybersecurity risk.
Commun. ACM, 2012

2011
Column: File Cabinet Forensics.
JDFSL, 2011

Column: Every Last Byte.
JDFSL, 2011

Challenges in Monitoring Cyberarms Compliance.
IJCWT, 2011

Operations with Degraded Security.
IEEE Security & Privacy, 2011

Extending digital repository architectures to support disk image preservation and access.
Proceedings of the 2011 Joint International Conference on Digital Libraries, 2011

Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

2010
An Automated Solution to the Multiuser Carved Data Ascription Problem.
IEEE Trans. Information Forensics and Security, 2010

Institutional review boards and your research.
Commun. ACM, 2010

Wouldn't it be nice to have software labels.
Proceedings of the 2010 Annual ACM SIGAda International Conference on Ada, 2010

Global Analysis of Drive File Times.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

2009
Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools.
IJDCF, 2009

New XML-Based Files Implications for Forensics.
IEEE Security & Privacy, 2009

Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

File Fragment Classification-The Case for Specialized Approaches.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

Automating Disk Forensic Processing with SleuthKit, XML and Python.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

2008
Sharp Figures, Fuzzy Purpose.
IEEE Security & Privacy, 2008

IRBs and Security Research: Myths, Facts and Mission Creep.
Proceedings of the Usability, Psychology, and Security, 2008

Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Commodity Grid Computing with Amazon's S3 and EC2.
;login:, 2007

Complete delete vs. time machine computing.
Operating Systems Review, 2007

Document & Media Exploitation.
ACM Queue, 2007

Bitfrost: the one laptop per child security model.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

2006
Guest Editors' Introduction: Data Surveillance.
IEEE Security & Privacy, 2006

Forensic feature extraction and cross-drive analysis.
Digital Investigation, 2006

AFF: a new format for storing hard drive images.
Commun. ACM, 2006

One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Issues in Automatic Provenance Collection.
Proceedings of the Provenance and Annotation of Data, 2006

AFF: An Open Extensible Format for Disk Imaging.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Do security toolbars actually prevent phishing attacks?
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
Design principles and patterns for computer systems that are simultaneously secure and usable.
PhD thesis, 2005

RFID Privacy: An Overview of Problems and Proposed Solutions.
IEEE Security & Privacy, 2005

Johnny 2: a user test of key continuity management with S/MIME and Outlook Express.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce.
Proceedings of the Financial Cryptography and Data Security, 2005

How to make secure email easier to use.
Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Guest Editors' Introduction: Secure or Usable?
IEEE Security & Privacy, 2004

Used Disk Drives.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

2003
Remembrance of Data Passed: A Study of Disk Sanitization Practices.
IEEE Security & Privacy, 2003

Email-Based Identification and Authentication: An Alternative to PKI?
IEEE Security & Privacy, 2003

Leaderless resistance today.
First Monday, 2003

IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices.
IEEE Distributed Systems Online, 2003

Enabling Email Confidentiality through the use of Opportunistic Encryption.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

Practical Unix and internet security - securing Solaris, Mac OS X, Linux and FreeBSD: extensivley revised (3. ed.).
O'Reilly, ISBN: 978-0-596-00323-4, 2003

2002
Building Cocoa applications - a step-by-step guide.
O'Reilly, ISBN: 978-0-596-00235-0, 2002

2001
Database nation - the death of privacy in the 21th century.
O'Reilly, ISBN: 978-0-596-00105-6, 2001

2000
Database nation (book excerpts).
Ubiquity, 2000

1998
Stopping spam - stamping out unwanted email and news postings.
O'Reilly, ISBN: 978-1-56592-388-1, 1998

1997
Secure CGI/API programming.
World Wide Web Journal, 1997

Cryptography and the Web.
World Wide Web Journal, 1997

Web security and commerce - risks, technologies, and strategies.
O'Reilly, ISBN: 978-1-56592-269-3, 1997

1996
Practical UNIX and internet security (2. ed.).
O'Reilly, ISBN: 978-1-56592-148-1, 1996

1995
Risks of Social Security Numbers.
Commun. ACM, 1995

PGP - pretty good privacy: encryption for everyone (2. ed.).
O'Reilly, ISBN: 978-1-56592-098-9, 1995


  Loading...