USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 25 results:
Filters: Author is J. Alex Halderman [Clear All Filters]
The Antrim County 2020 Election Incident: An Independent Forensic Investigation. 31st USENIX Security Symposium (USENIX Security 22). :589--605.
.
2022. OpenVPN is Open to VPN Fingerprinting. 31st USENIX Security Symposium (USENIX Security 22). :483--500.
.
2022. Security Analysis of the Democracy Live Online Voting System. 30th USENIX Security Symposium (USENIX Security 21). :3077--3092.
.
2021. Quack: Scalable Remote Measurement of Application-Layer Censorship. 27th USENIX Security Symposium (USENIX Security 18). :187--202.
.
2018. Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). :1093--1110.
.
2017. DROWN: Breaking TLS Using SSLv2. 25th USENIX Security Symposium (USENIX Security 16). :689--706.
.
2016. Replication Prohibited: Attacking Restricted Keyways with 3D-Printing. 9th USENIX Workshop on Offensive Technologies (WOOT 15).
.
2015. Green Lights Forever: Analyzing the Security of Traffic Infrastructure. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. An Internet-Wide View of Internet-Wide Scanning. 23rd USENIX Security Symposium (USENIX Security 14). :65--78.
.
2014. Security Analysis of a Full-Body Scanner. 23rd USENIX Security Symposium (USENIX Security 14). :369--384.
.
2014. TapDance: End-to-Middle Anticensorship without Flow Blocking. 23rd USENIX Security Symposium (USENIX Security 14). :159--174.
.
2014. Zippier ZMap: Internet-Wide Scanning at 10 Gbps. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. Illuminating the Security Issues Surrounding Lights-Out Server Management. 7th USENIX Workshop on Offensive Technologies (WOOT 13).
.
2013. Internet Censorship in Iran: A First Look. 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13).
.
2013. ZMap: Fast Internet-wide Scanning and Its Security Applications. 22nd USENIX Security Symposium (USENIX Security 13). :605--620.
.
2013. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. 21st USENIX Security Symposium (USENIX Security 12). :205--220.
.
2012. Deport on Arrival: Adventures in Technology, Politics, and Power. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Telex: Anticensorship in the Network Infrastructure. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Crawling BitTorrent DHTs for Fun and Profit. 4th USENIX Workshop on Offensive Technologies (WOOT 10).
.
2010. Panel on Indian Electronic Voting Machines (EVMs}}}}). 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
.
2010. Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).
.
2009. In Defense of Pseudorandom Sample Selection. 2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 08).
.
2008. Lest We Remember: Cold Boot Attacks on Encryption Keys. 17th USENIX Security Symposium (USENIX Security 08).
.
2008. Security Analysis of the Diebold AccuVote-TS Voting Machine. 2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 07).
.
2007. Lessons from the Sony CD DRM Episode. 15th USENIX Security Symposium (USENIX Security 06).
.
2006.