Author image not provided
 Dan Seth Wallach

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article20.84
Citation Count1,417
Publication count68
Publication years1994-2017
Available for download27
Average downloads per article1,910.26
Downloads (cumulative)51,577
Downloads (12 Months)2,347
Downloads (6 Weeks)142
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


68 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 68
Result page: 1 2 3 4

Sort by:

1
March 2017 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 20 Issue S, March 2017
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Memory analysis is slowly moving up the software stack. Early analysis efforts focused on core OS structures and services. As this field evolves, more information becomes accessible because analysis tools can build on foundational frameworks like Volatility and Rekall. This paper demonstrates and establishes memory analysis techniques for managed runtimes, ...
Keywords: HotSpot JVM, Malware analysis, Memory forensics, Java, Managed runtimes

2
November 2015 IEEE Transactions on Mobile Computing: Volume 14 Issue 11, November 2015
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation—something not exposed on commodity 802.11 devices—or valid RSSI observations from ...

3 published by ACM
October 2015 WPES '15: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 12,   Downloads (12 Months): 80,   Downloads (Overall): 1,852

Full text available: PDFPDF
Twitter, widely used around the world, has a standard interface for government agencies to request that individual tweets or even whole accounts be censored. Twitter, in turn, discloses country-by-country statistics about this censorship in its transparency reports as well as reporting specific incidents of censorship to the Chilling Effects web ...
Keywords: censorship, social networks, twitter

4
August 2015 Proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 9190
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

This study sought to understand voter's mental models for three end-to-end e2e voting systems: Helios, Prêt í Voter, and Scantegrity II. To study voters' mental models of e2e systems, 16 Houston area voters participated in mock elections that required them to vote first with a paper ballot and then with ...
Keywords: Voting systems, Mental models, User centered design, End-to-end voting methods

5 published by ACM
June 2015 MobiHoc '15: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 3,   Downloads (12 Months): 14,   Downloads (Overall): 159

Full text available: PDFPDF  ePubePub
Delay Tolerant Networks (DTNs) composed of commodity mobile devices have the potential to support communication applications resistant to blocking and censorship, as well as certain types of surveillance. We analyze the performance and energy consumption of such a network, and consider the impact of random and targeted denial-of-service and censorship ...
Keywords: opportunistic networks, censorship resistance, delay tolerant networks, microblogging, energy overhead

6 published by ACM
March 2015 ACM Transactions on Internet Technology (TOIT) - Special Issue on Foundations of Social Computing: Volume 15 Issue 1, February 2015
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 11,   Downloads (12 Months): 97,   Downloads (Overall): 719

Full text available: PDFPDF
Most previous analysis of Twitter user behavior has focused on individual information cascades and the social followers graph, in which the nodes for two users are connected if one follows the other. We instead study aggregate user behavior and the retweet graph with a focus on quantitative descriptions. We find ...
Keywords: microblogging systems, decentralized network architectures, Social network analysis

7 published by ACM
March 2014 Communications of the ACM: Volume 57 Issue 3, March 2014
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 12,   Downloads (Overall): 921

Full text available: HtmlHtml  PDFPDF  PDF Chinese translationPDF Chinese translation

8 published by ACM
November 2013 SPSM '13: Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 3,   Downloads (12 Months): 40,   Downloads (Overall): 332

Full text available: PDFPDF
A growing concern with advertisement libraries on Android is their ability to exfiltrate personal information from their host applications. While previous work has looked at the libraries' abilities to extract private information from the system, advertising libraries also include APIs through which a host application can deliberately leak private information ...
Keywords: advertising libraries, android, privacy

9
August 2013 SEC'13: Proceedings of the 22nd USENIX conference on Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 4

Weibo and other popular Chinese microblogging sites are well known for exercising internal censorship, to comply with Chinese government requirements. This research seeks to quantify the mechanisms of this censorship: how fast and how comprehensively posts are deleted. Our analysis considered 2.38 million posts gathered over roughly two months in ...

10 published by ACM
October 2012 CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 7,   Downloads (12 Months): 55,   Downloads (Overall): 768

Full text available: PDFPDF
User authentication systems are at an impasse. The most ubiquitous method -- the password -- has numerous problems, including susceptibility to unintentional exposure via phishing and cross-site password reuse. Second-factor authentication schemes have the potential to increase security but face usability and deployability challenges. For example, conventional second-factor schemes change ...
Keywords: authentication, login, second factor, web

11 published by ACM
October 2011 Communications of the ACM: Volume 54 Issue 10, October 2011
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 30,   Downloads (12 Months): 1,553,   Downloads (Overall): 22,573

Full text available: HtmlHtml  PDFPDF
A proposal for a new cost-free open-access publication model for computer science papers.

12 published by ACM
September 2011 ACM Transactions on Information and System Security (TISSEC): Volume 14 Issue 2, September 2011
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 3,   Downloads (12 Months): 41,   Downloads (Overall): 585

Full text available: PDFPDF
Authenticated dictionaries are a widely discussed paradigm to enable verifiable integrity for data storage on untrusted servers, such as today’s widely used “cloud computing” resources, allowing a server to provide a “proof,” typically in the form of a slice through a cryptographic data structure, that the results of any given ...
Keywords: tamper evident data structures, persistent data structures, Authenticated dictionaries

13
August 2011 SEC'11: Proceedings of the 20th USENIX conference on Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 91

Smartphone apps are often granted to privilege to run with access to the network and sensitive local resources. This makes it difficult for remote endpoints to place any trust in the provenance of network connections originating from a user's device. Even on the phone, different apps with distinct privilege sets ...

14 published by ACM
June 2011 MobiArch '11: Proceedings of the sixth international workshop on MobiArch
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 106

Full text available: PDFPDF
Mobile ad-hoc networks of wireless devices (MANETs) hold the promise of providing network services without traditional infrastructures that could fall victim to manipulation and censorship. Unfortunately, current MANET systems suffer significant scalability problems, effectively precluding their use for general-purpose networking. We suggest tailoring MANETs to particular classes of application and ...
Keywords: anonymity, geographic routing, location privacy, mobile ad hoc network (manet), motion patterns

15
January 2010 FC'10: Proceedings of the 14th international conference on Financial Cryptography and Data Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 15

Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as the demands on the Tor network. We explore techniques to incentivize Tor users to relay Tor traffic too; if users contribute resources to the Tor ...

16 published by ACM
January 2010 Communications of the ACM - Amir Pnueli: Ahead of His Time: Volume 53 Issue 1, January 2010
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 575

Full text available: HtmlHtml  PDFPDF

17
September 2009 ESORICS'09: Proceedings of the 14th European conference on Research in computer security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

Authenticated dictionaries allow users to send lookup requests to an untrusted server and get authenticated answers. Persistent authenticated dictionaries (PADs) add queries against historical versions. We consider a variety of different trust models for PADs and we present several extensions, including support for aggregation and a rich query language, as ...

18
August 2009 EVT/WOTE'09: Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Publisher: USENIX Association
Bibliometrics:
Citation Count: 4

This paper describes a minimal implementation of a cryptographically secure electronic voting system, built with a low-cost Xilinx FPGA board. This system, called VoteBox Nano, follows the same basic design principles as VoteBox, a full-featured electronic voting system. As with VoteBox, the votes are encrypted using Elgamal homomorphic encryption and ...

19
August 2009 SSYM'09: Proceedings of the 18th conference on USENIX security symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 21

Many real-world applications wish to collect tamperevident logs for forensic purposes. This paper considers the case of an untrusted logger, serving a number of clients who wish to store their events in the log, and kept honest by a number of auditors who will challenge the logger to prove its ...

20
April 2009 IPTPS'09: Proceedings of the 8th international conference on Peer-to-peer systems
Publisher: USENIX Association
Bibliometrics:
Citation Count: 11

Microblogging, as exemplified by Twitter, is gaining popularity as a way to exchange short messages within social networks. However, the limitations of current microblog services--proprietary, centralized, and isolated-- threaten the long-term viability of this new medium. In this work we investigate the current state of microblogging and envision an open, ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us