Biblio

Export 25 results:
Filters: Author is J. Alex Halderman  [Clear All Filters]
2022
J. Halderman A.  2022.  The Antrim County 2020 Election Incident: An Independent Forensic Investigation. 31st USENIX Security Symposium (USENIX Security 22). :589--605.
Xue D, Ramesh R, Jain A, Kallitsis M, J. Halderman A, Crandall JR, Ensafi R.  2022.  OpenVPN is Open to VPN Fingerprinting. 31st USENIX Security Symposium (USENIX Security 22). :483--500.
2021
Specter M, J. Halderman A.  2021.  Security Analysis of the Democracy Live Online Voting System. 30th USENIX Security Symposium (USENIX Security 21). :3077--3092.
2017
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, J. Halderman A, Invernizzi L, Kallitsis M et al..  2017.  Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). :1093--1110.
2016
Aviram N, Schinzel S, Somorovsky J, Heninger N, Dankel M, Steube J, Valenta L, Adrian D, J. Halderman A, Dukhovni V et al..  2016.  DROWN: Breaking TLS Using SSLv2. 25th USENIX Security Symposium (USENIX Security 16). :689--706.
2014
Ghena B, Beyer W, Hillaker A, Pevarnek J, J. Halderman A.  2014.  Green Lights Forever: Analyzing the Security of Traffic Infrastructure. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Durumeric Z, Bailey M, J. Halderman A.  2014.  An Internet-Wide View of Internet-Wide Scanning. 23rd USENIX Security Symposium (USENIX Security 14). :65--78.
Mowery K, Wustrow E, Wypych T, Singleton C, Comfort C, Rescorla E, J. Halderman A, Shacham H, Checkoway S.  2014.  Security Analysis of a Full-Body Scanner. 23rd USENIX Security Symposium (USENIX Security 14). :369--384.
Wustrow E, Swanson CM, J. Halderman A.  2014.  TapDance: End-to-Middle Anticensorship without Flow Blocking. 23rd USENIX Security Symposium (USENIX Security 14). :159--174.
Adrian D, Durumeric Z, Singh G, J. Halderman A.  2014.  Zippier ZMap: Internet-Wide Scanning at 10 Gbps. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
2013
Bonkoski A, Bielawski R, J. Halderman A.  2013.  Illuminating the Security Issues Surrounding Lights-Out Server Management. 7th USENIX Workshop on Offensive Technologies (WOOT 13).
Aryan S, Aryan H, J. Halderman A.  2013.  Internet Censorship in Iran: A First Look. 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13).
Durumeric Z, Wustrow E, J. Halderman A.  2013.  ZMap: Fast Internet-wide Scanning and Its Security Applications. 22nd USENIX Security Symposium (USENIX Security 13). :605--620.
2011
J. Halderman A.  2011.  Deport on Arrival: Adventures in Technology, Politics, and Power. 20th USENIX Security Symposium (USENIX Security 11).
Wustrow E, Wolchok S, Goldberg I, J. Halderman A.  2011.  Telex: Anticensorship in the Network Infrastructure. 20th USENIX Security Symposium (USENIX Security 11).
2010
Wolchok S, J. Halderman A.  2010.  Crawling BitTorrent DHTs for Fun and Profit. 4th USENIX Workshop on Offensive Technologies (WOOT 10).
Hall JLorenzo, Indiresan P.V., Rao G.V.LNarasimha, Shukla A, J. Halderman A.  2010.  Panel on Indian Electronic Voting Machines (EVMs}}}}). 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
2009
Checkoway S, Feldman AJ, Kantor B, J. Halderman A, Felten EW, Shacham H.  2009.  Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage 2009 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 09).
2008
Calandrino JA, J. Halderman A, Felten EW.  2008.  In Defense of Pseudorandom Sample Selection. 2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 08).
J. Halderman A, Schoen SD, Heninger N, Clarkson W, Paul W, Calandrino JA, Feldman AJ, Appelbaum J, Felten EW.  2008.  Lest We Remember: Cold Boot Attacks on Encryption Keys. 17th USENIX Security Symposium (USENIX Security 08).
2007
Feldman AJ, J. Halderman A, Felten EW.  2007.  Security Analysis of the Diebold AccuVote-TS Voting Machine. 2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 07).
2006
J. Halderman A, Felten EW.  2006.  Lessons from the Sony CD DRM Episode. 15th USENIX Security Symposium (USENIX Security 06).