What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
J. Alex Halderman
Google Scholar
48
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
DVSorder: Ballot Randomization Flaws Threaten Voter Privacy.
Braden L. Crimmins
Dhanya Narayanan
Drew Springall
J. Alex Halderman
2022
conf/uss
The Antrim County 2020 Election Incident: An Independent Forensic Investigation.
J. Alex Halderman
2022
conf/uss
OpenVPN is Open to VPN Fingerprinting.
Diwen Xue
Reethika Ramesh
Arham Jain
Michalis Kallitsis
J. Alex Halderman
Jedidiah R. Crandall
Roya Ensafi
2022
conf/fc
RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail.
Braden L. Crimmins
Marshall Rhea
J. Alex Halderman
2021
conf/uss
Security Analysis of the Democracy Live Online Voting System.
Michael A. Specter
J. Alex Halderman
2020
journals/popets
Running Refraction Networking for Real.
Benjamin VanderSloot
Sergey Frolov
Jack Wampler
Sze Chuen Tan
Irv Simpson
Michalis Kallitsis
J. Alex Halderman
Nikita Borisov
Eric Wustrow
2020
conf/sp
Can Voters Detect Malicious Manipulation of Ballot Marking Devices?
Matthew Bernhard
Allison McDonald
Henry Meng
Jensen Hwa
Nakul Bajaj
Kevin Chang
J. Alex Halderman
2019
conf/ccs
Conjure: Summoning Proxies from Unused Address Space.
Sergey Frolov
Jack Wampler
Sze Chuen Tan
J. Alex Halderman
Nikita Borisov
Eric Wustrow
2019
conf/ccs
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web.
Josh Aas
Richard Barnes
Benton Case
Zakir Durumeric
Peter Eckersley
Alan Flores-López
J. Alex Halderman
Jacob Hoffman-Andrews
James Kasten
Eric Rescorla
Seth D. Schoen
Brad Warren
2019
conf/fc
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits.
Kellie Ottoboni
Matthew Bernhard
J. Alex Halderman
Ronald L. Rivest
Philip B. Stark
2018
conf/uss
Quack: Scalable Remote Measurement of Application-Layer Censorship.
Benjamin VanderSloot
Allison McDonald
Will Scott
J. Alex Halderman
Roya Ensafi
2018
conf/sp
Tracking Certificate Misissuance in the Wild.
Deepak Kumar
Zhengping Wang
Matthew Hyder
Joseph Dickinson
Gabrielle Beck
David Adrian
Joshua Mason
Zakir Durumeric
J. Alex Halderman
Michael D. Bailey
2017
conf/uss
An ISP-Scale Deployment of TapDance.
Sergey Frolov
Frederick Douglas
Will Scott
Allison McDonald
Benjamin VanderSloot
Rod Hynes
Adam Kruger
Michalis Kallitsis
David G. Robinson
Steve Schultze
Nikita Borisov
J. Alex Halderman
Eric Wustrow
2017
conf/uss
Understanding the Mirai Botnet.
Manos Antonakakis
Tim April
Michael D. Bailey
Matt Bernhard
Elie Bursztein
Jaime Cochran
Zakir Durumeric
J. Alex Halderman
Luca Invernizzi
Michalis Kallitsis
Deepak Kumar
Chaz Lever
Zane Ma
Joshua Mason
Damian Menscher
Chad Seaman
Nick Sullivan
Kurt Thomas
Yi Zhou
2017
conf/ndss
Measuring small subgroup attacks against Diffie-Hellman.
Luke Valenta
David Adrian
Antonio Sanso
Shaanan Cohney
Joshua Fried
Marcella Hastings
J. Alex Halderman
Nadia Heninger
2017
conf/ndss
The Security Impact of HTTPS Interception.
Zakir Durumeric
Zane Ma
Drew Springall
Richard Barnes
Nick Sullivan
Elie Bursztein
Michael D. Bailey
J. Alex Halderman
Vern Paxson
2016
conf/uss
DROWN: Breaking TLS Using SSLv2.
Nimrod Aviram
Sebastian Schinzel
Juraj Somorovsky
Nadia Heninger
Maik Dankel
Jens Steube
Luke Valenta
David Adrian
J. Alex Halderman
Viktor Dukhovni
Emilia Käsper
Shaanan Cohney
Susanne Engels
Christof Paar
Yuval Shavitt
2016
conf/fc
Android UI Deception Revisited: Attacks and Defenses.
Earlence Fernandes
Qi Alfred Chen
Justin Paupore
Georg Essl
J. Alex Halderman
Zhuoqing Morley Mao
Atul Prakash
2016
conf/nspw
Content-based security for the web.
Alexander Afanasyev
J. Alex Halderman
Scott Ruoti
Kent E. Seamons
Yingdi Yu
Daniel Zappala
Lixia Zhang
2016
conf/dsn
FTP: The Forgotten Cloud.
Drew Springall
Zakir Durumeric
J. Alex Halderman
2015
conf/ccs
A Search Engine Backed by Internet-Wide Scanning.
Zakir Durumeric
David Adrian
Ariana Mirian
Michael D. Bailey
J. Alex Halderman
2015
conf/ccs
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.
David Adrian
Karthikeyan Bhargavan
Zakir Durumeric
Pierrick Gaudry
Matthew Green
J. Alex Halderman
Nadia Heninger
Drew Springall
Emmanuel Thomé
Luke Valenta
Benjamin VanderSloot
Eric Wustrow
Santiago Zanella-Béguelin
Paul Zimmermann
2015
conf/esorics
Umbra: Embedded Web Security Through Application-Layer Firewalls.
Travis Finkenauer
J. Alex Halderman
2014
conf/ccs
Security Analysis of the Estonian Internet Voting System.
Drew Springall
Travis Finkenauer
Zakir Durumeric
Jason Kitcat
Harri Hursti
Margaret MacAlpine
J. Alex Halderman
2014
conf/uss
An Internet-Wide View of Internet-Wide Scanning.
Zakir Durumeric
Michael D. Bailey
J. Alex Halderman
2014
conf/uss
TapDance: End-to-Middle Anticensorship without Flow Blocking.
Eric Wustrow
Colleen Swanson
J. Alex Halderman
2014
conf/uss
Security Analysis of a Full-Body Scanner.
Keaton Mowery
Eric Wustrow
Tom Wypych
Corey Singleton
Chris Comfort
Eric Rescorla
J. Alex Halderman
Hovav Shacham
Stephen Checkoway
2014
conf/fc
Elliptic Curve Cryptography in Practice.
Joppe W. Bos
J. Alex Halderman
Nadia Heninger
Jonathan Moore
Michael Naehrig
Eric Wustrow
2014
conf/fc
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security.
Alex Migicovsky
Zakir Durumeric
Jeff Ringenberg
J. Alex Halderman
2013
conf/uss
ZMap: Fast Internet-wide Scanning and Its Security Applications.
Zakir Durumeric
Eric Wustrow
J. Alex Halderman
2013
conf/uss
Internet Censorship in Iran: A First Look.
Simurgh Aryan
Homa Aryan
J. Alex Halderman
2013
conf/fc
CAge: Taming Certificate Authorities by Inferring Restricted Scopes.
James Kasten
Eric Wustrow
J. Alex Halderman
2012
conf/uss
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Nadia Heninger
Zakir Durumeric
Eric Wustrow
J. Alex Halderman
2012
conf/fc
Attacking the Washington, D.C. Internet Voting System.
Scott Wolchok
Eric Wustrow
Dawn Isabel
J. Alex Halderman
2011
conf/uss
Telex: Anticensorship in the Network Infrastructure.
Eric Wustrow
Scott Wolchok
Ian Goldberg
J. Alex Halderman
2011
conf/fc
Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools.
Jay Novak
Jonathan Stribley
Kenneth Meagher
J. Alex Halderman
2011
conf/fc
Ethical Issues in E-Voting Security Analysis.
David G. Robinson
J. Alex Halderman
2010
conf/ccs
Security analysis of India's electronic voting machines.
Scott Wolchok
Eric Wustrow
J. Alex Halderman
Hari K. Prasad
Arun Kankipati
Sai Krishna Sakhamuri
Vasavya Yagati
Rop Gonggrijp
2010
conf/ndss
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Scott Wolchok
Owen S. Hofmann
Nadia Heninger
Edward W. Felten
J. Alex Halderman
Christopher J. Rossbach
Brent Waters
Emmett Witchel
2009
conf/uss
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Stephen Checkoway
Ariel J. Feldman
Brian Kantor
J. Alex Halderman
Edward W. Felten
Hovav Shacham
2009
conf/sp
Fingerprinting Blank Paper Using Commodity Scanners.
William Clarkson
Tim Weyrich
Adam Finkelstein
Nadia Heninger
J. Alex Halderman
Edward W. Felten
2008
conf/uss
Lest We Remember: Cold Boot Attacks on Encryption Keys.
J. Alex Halderman
Seth D. Schoen
Nadia Heninger
William Clarkson
William Paul
Joseph A. Calandrino
Ariel J. Feldman
Jacob Appelbaum
Edward W. Felten
2008
conf/uss
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
J. Alex Halderman
Eric Rescorla
Hovav Shacham
David A. Wagner
2008
conf/uss
In Defense of Pseudorandom Sample Selection.
Joseph A. Calandrino
J. Alex Halderman
Edward W. Felten
2007
conf/ccs
Harvesting verifiable challenges from oblivious online sources.
J. Alex Halderman
Brent Waters
2007
conf/uss
Security Analysis of the Diebold AccuVote-TS Voting Machine.
Ariel J. Feldman
J. Alex Halderman
Edward W. Felten
2006
conf/uss
Lessons from the Sony CD DRM Episode.
J. Alex Halderman
Edward W. Felten
2004
conf/ccs
New client puzzle outsourcing techniques for DoS resistance.
Brent Waters
Ari Juels
J. Alex Halderman
Edward W. Felten
Coauthors
Adam Finkelstein
(1)
Adam Kruger
(1)
Alan Flores-López
(1)
Alex Migicovsky
(1)
Alexander Afanasyev
(1)
Allison McDonald
(3)
Antonio Sanso
(1)
Arham Jain
(1)
Ari Juels
(1)
Ariana Mirian
(1)
Ariel J. Feldman
(3)
Arun Kankipati
(1)
Atul Prakash
(1)
Benjamin VanderSloot
(4)
Benton Case
(1)
Brad Warren
(1)
Braden L. Crimmins
(2)
Brent Waters
(3)
Brian Kantor
(1)
Chad Seaman
(1)
Chaz Lever
(1)
Chris Comfort
(1)
Christof Paar
(1)
Christopher J. Rossbach
(1)
Colleen Swanson
(1)
Corey Singleton
(1)
Damian Menscher
(1)
Daniel Zappala
(1)
David A. Wagner
(1)
David Adrian
(5)
David G. Robinson
(2)
Dawn Isabel
(1)
Deepak Kumar
(2)
Dhanya Narayanan
(1)
Diwen Xue
(1)
Drew Springall
(5)
Earlence Fernandes
(1)
Edward W. Felten
(8)
Elie Bursztein
(2)
Emilia Käsper
(1)
Emmanuel Thomé
(1)
Emmett Witchel
(1)
Eric Rescorla
(3)
Eric Wustrow
(13)
Frederick Douglas
(1)
Gabrielle Beck
(1)
Georg Essl
(1)
Hari K. Prasad
(1)
Harri Hursti
(1)
Henry Meng
(1)
Homa Aryan
(1)
Hovav Shacham
(3)
Ian Goldberg
(1)
Irv Simpson
(1)
J. Alex Halderman
(48)
Jack Wampler
(2)
Jacob Appelbaum
(1)
Jacob Hoffman-Andrews
(1)
Jaime Cochran
(1)
James Kasten
(2)
Jason Kitcat
(1)
Jay Novak
(1)
Jedidiah R. Crandall
(1)
Jeff Ringenberg
(1)
Jens Steube
(1)
Jensen Hwa
(1)
Jonathan Moore
(1)
Jonathan Stribley
(1)
Joppe W. Bos
(1)
Joseph A. Calandrino
(2)
Joseph Dickinson
(1)
Josh Aas
(1)
Joshua Fried
(1)
Joshua Mason
(2)
Juraj Somorovsky
(1)
Justin Paupore
(1)
Karthikeyan Bhargavan
(1)
Keaton Mowery
(1)
Kellie Ottoboni
(1)
Kenneth Meagher
(1)
Kent E. Seamons
(1)
Kevin Chang
(1)
Kurt Thomas
(1)
Lixia Zhang
(1)
Luca Invernizzi
(1)
Luke Valenta
(3)
Maik Dankel
(1)
Manos Antonakakis
(1)
Marcella Hastings
(1)
Margaret MacAlpine
(1)
Marshall Rhea
(1)
Matt Bernhard
(1)
Matthew Bernhard
(2)
Matthew Green
(1)
Matthew Hyder
(1)
Michael A. Specter
(1)
Michael D. Bailey
(5)
Michael Naehrig
(1)
Michalis Kallitsis
(4)
Nadia Heninger
(8)
Nakul Bajaj
(1)
Nick Sullivan
(2)
Nikita Borisov
(3)
Nimrod Aviram
(1)
Owen S. Hofmann
(1)
Paul Zimmermann
(1)
Peter Eckersley
(1)
Philip B. Stark
(1)
Pierrick Gaudry
(1)
Qi Alfred Chen
(1)
Reethika Ramesh
(1)
Richard Barnes
(2)
Rod Hynes
(1)
Ronald L. Rivest
(1)
Rop Gonggrijp
(1)
Roya Ensafi
(2)
Sai Krishna Sakhamuri
(1)
Santiago Zanella-Béguelin
(1)
Scott Ruoti
(1)
Scott Wolchok
(4)
Sebastian Schinzel
(1)
Sergey Frolov
(3)
Seth D. Schoen
(2)
Shaanan Cohney
(2)
Simurgh Aryan
(1)
Stephen Checkoway
(2)
Steve Schultze
(1)
Susanne Engels
(1)
Sze Chuen Tan
(2)
Tim April
(1)
Tim Weyrich
(1)
Tom Wypych
(1)
Travis Finkenauer
(2)
Vasavya Yagati
(1)
Vern Paxson
(1)
Viktor Dukhovni
(1)
Will Scott
(2)
William Clarkson
(2)
William Paul
(1)
Yi Zhou
(1)
Yingdi Yu
(1)
Yuval Shavitt
(1)
Zakir Durumeric
(12)
Zane Ma
(2)
Zhengping Wang
(1)
Zhuoqing Morley Mao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to