Zobrazeno 1 - 10
of 114
pro vyhledávání: '"Wallach, Dan S."'
Publikováno v:
The Cyber Defense Review, 2023 Oct 01. 8(3), 33-50.
Externí odkaz:
https://www.jstor.org/stable/48755360
Despite significant research and engineering efforts, many of today's important computer systems suffer from bugs. To increase the reliability of software systems, recent work has applied formal verification to certify the correctness of such systems
Externí odkaz:
http://arxiv.org/abs/2012.07917
We investigate adblocking filters and the extent to which websites and advertisers react when their content is impacted by these filters. We collected data daily from the Alexa Top-5000 web sites for 120 days, and from specific sites that newly appea
Externí odkaz:
http://arxiv.org/abs/1912.06176
Autor:
Wallach, Dan S.
A recent debate among election experts has considered whether electronic ballot marking devices (BMDs) have adequate security against the risks of malware. A malicious BMD might produce a printed ballot that disagrees with a voter's actual intent, wi
Externí odkaz:
http://arxiv.org/abs/1908.01897
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Bernhard, Matthew, Benaloh, Josh, Halderman, J. Alex, Rivest, Ronald L., Ryan, Peter Y. A., Stark, Philip B., Teague, Vanessa, Vora, Poorvi L., Wallach, Dan S.
Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correc
Externí odkaz:
http://arxiv.org/abs/1707.08619
Autor:
Moran, Murat, Wallach, Dan S.
We present the first automated privacy analysis of STAR-Vote, a real world voting system design with sophisticated "end-to-end" cryptography, using FDR and ProVerif. We also evaluate the effectiveness of these tools. Despite the complexity of the vot
Externí odkaz:
http://arxiv.org/abs/1705.00782
Autor:
Book, Theodore, Wallach, Dan S.
Advertising, long the financial mainstay of the web ecosystem, has become nearly ubiquitous in the world of mobile apps. While ad targeting on the web is fairly well understood, mobile ad targeting is much less studied. In this paper, we use empirica
Externí odkaz:
http://arxiv.org/abs/1502.06577
Legacy device drivers implement both device resource management and isolation. This results in a large code base with a wide high-level interface making the driver vulnerable to security attacks. This is particularly problematic for increasingly popu
Externí odkaz:
http://arxiv.org/abs/1411.3777
Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, m
Externí odkaz:
http://arxiv.org/abs/1403.5871